Reader small image

You're reading from  Implementing DevSecOps Practices

Product typeBook
Published inDec 2023
PublisherPackt
ISBN-139781803231495
Edition1st Edition
Right arrow
Author (1)
Vandana Verma Sehgal
Vandana Verma Sehgal
author image
Vandana Verma Sehgal

Vandana Verma Sehgal is a seasoned cybersecurity professional with over 17 years of experience, specializes in DevSecOps, and has a diverse background in Vulnerability management, SOC, Infrastructure, Application, and Cloud Security. She is a speaker and trainer, having presented at events like Global OWASP AppSec, BlackHat, and Grace Hopper. Vandana actively contributes to the cybersecurity community as a member of the OWASP Global Board of Directors, and Black Hat Asia Review Board and is deeply involved in diversity initiatives like InfosecGirls, WoSec, and null. She has earned numerous awards, including Cyber Security Woman of the Year 2020 and Application Security Influencer 2020 in India. Her passion for diversity and inclusion drives initiatives like InfosecGirls, WoSec, and InfosecKids, inspiring and empowering the next generation of security professionals.
Read more about Vandana Verma Sehgal

Right arrow

Comparing DAST with other security testing approaches

There are several different approaches to application security testing, each with its strengths and weaknesses. In this section, we’ll compare DAST with other security testing approaches.

SAST

SAST is the process of analyzing the application’s source code to identify security vulnerabilities. Unlike DAST, which tests the application in a running state, SAST examines the application’s code and can detect vulnerabilities that may not be visible during runtime. However, SAST is limited by its inability to detect vulnerabilities that arise from user input or environmental factors.

IAST

IAST utilizes and combines the best features of SAST and DAST. IAST monitors the application during runtime and analyzes its behavior to detect vulnerabilities in real time. It also examines the application’s source code to detect vulnerabilities that may not be visible during runtime. However, IAST can be complex...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Implementing DevSecOps Practices
Published in: Dec 2023Publisher: PacktISBN-13: 9781803231495

Author (1)

author image
Vandana Verma Sehgal

Vandana Verma Sehgal is a seasoned cybersecurity professional with over 17 years of experience, specializes in DevSecOps, and has a diverse background in Vulnerability management, SOC, Infrastructure, Application, and Cloud Security. She is a speaker and trainer, having presented at events like Global OWASP AppSec, BlackHat, and Grace Hopper. Vandana actively contributes to the cybersecurity community as a member of the OWASP Global Board of Directors, and Black Hat Asia Review Board and is deeply involved in diversity initiatives like InfosecGirls, WoSec, and null. She has earned numerous awards, including Cyber Security Woman of the Year 2020 and Application Security Influencer 2020 in India. Her passion for diversity and inclusion drives initiatives like InfosecGirls, WoSec, and InfosecKids, inspiring and empowering the next generation of security professionals.
Read more about Vandana Verma Sehgal