Hook / Why this matters
๐ฏ CISSP Lens
Pick answers that align business risk, governance intent, and practical control execution.
Security testing is more than a last minute penetration test. Done well, it is a layered set of checks across the SDLC that supports fast, reliable releases. Done poorly, it creates noise, delays, and blind spots. CISSP Domain 8 expects you to design a balanced approach.
Core concept explained simply
Security testing answers two big questions:
- How secure is this system or change right now.
- Where are the weaknesses in our development practices.
No single test type can answer everything. Instead you combine methods at different stages.
Types of security testing
- Static application security testing (SAST): analyzes source or bytecode without running the app. Good for catching certain classes of bugs early.
- Dynamic application security testing (DAST): tests a running application from the outside. Good for seeing how it behaves under attack.
- Software composition analysis (SCA): identifies libraries and components and checks them for known vulnerabilities and license risks.
- Interactive application security testing (IAST) and runtime application self protection (RASP): monitor applications as they run to detect unsafe behaviors.
- Fuzzing: sends malformed or random inputs to find crashes and unexpected behaviors.
- Manual code review: humans examining code for logic flaws and context specific issues.
- Penetration testing and red teaming: skilled testers simulating real attackers.
Where they fit in the SDLC
During implementation
- Developers run linters and SAST tools in their IDEs or on commit.
- Code review includes security focused checks.
During integration and build
- CI pipelines run SAST, SCA, and basic security unit tests.
- Builds fail or are flagged when critical issues are detected.
During test and staging
- DAST scanners and targeted manual tests exercise key workflows.
- Fuzzing may be run against APIs and parsers.
- Security regression tests ensure previous issues do not reappear.
Pre release and periodic
- Manual penetration tests focus on high value systems, major changes, or compliance needs.
- Red team exercises test detection and response capabilities in production like environments.
In production
- Monitoring and logging detect attacks and unexpected behaviors.
- Bug bounty programs or coordinated disclosure programs extend coverage.
CISSP lens
๐ Domain cross-reference
๐ Domain cross-reference
For Domain 8 you need to:
- Recognize each testing type, its strengths, and its limitations.
- Understand black box, white box, and gray box approaches.
- Place testing activities in appropriate SDLC phases.
- Emphasize risk based coverage and continuous improvement.
Exam questions often ask which testing method to use in a scenario. Choose the one that matches available information and goals. For example, SAST when you have source code and want early feedback, DAST when you want to test a running application from an external perspective.
Real-world scenario
A bank relies almost entirely on annual external penetration tests to assess application security. Meanwhile, development teams push weekly releases.
After a significant incident, a review finds that many issues exploited in production had existed for months but were only found at the annual test.
The bank redesigns its testing strategy:
- SAST and SCA are added to CI for critical applications.
- DAST is run weekly against key internet facing services.
- High risk changes trigger targeted manual testing before release.
- Penetration tests focus on new architectures and major releases.
- Findings are tracked centrally, with metrics on time to remediate and recurring types.
Over time, serious vulnerabilities are caught earlier, and the scope of annual tests shifts toward validating overall posture instead of discovering basic issues.
Common mistakes and misconceptions
โ ๏ธ Watch for this mistake: Treating a single annual penetration test as complete assurance.
โ ๏ธ Watch for this mistake: Running tools with default settings and drowning teams in low value findings.
โ ๏ธ Watch for this mistake: Failing to integrate testing into CI and build processes, which leads to late surprises.
โ ๏ธ Watch for this mistake: Not linking test results to risk and business impact when prioritizing fixes.
โ ๏ธ Watch for this mistake: Ignoring APIs, background jobs, and microservices when defining test scope.
Actionable checklist
- โ โ Inventory existing security testing tools and activities and map them to SDLC phases.
- โ โ Identify gaps, such as no automated checks in CI or no regular testing of key APIs.
- โ โ Introduce SAST and SCA for high value applications, starting with a pilot.
- โ โ Define when to use DAST and manual penetration testing, based on risk and change size.
- โ โ Establish triage and remediation processes, including SLAs for critical findings.
- โ โ Track testing coverage and recurring vulnerability patterns and adjust training and standards.
- โ โ Report testing results in business terms, highlighting systems at risk and improvements over time.
Key takeaways
- ๐ก ๐ก Effective security testing uses multiple methods across the SDLC, not a single pen test.
- ๐ก ๐ก Automation in CI catches many issues early and keeps pace with frequent releases.
- ๐ก ๐ก Tool output must be triaged and managed, or it will be ignored.
- ๐ก ๐ก CISSP Domain 8 focuses on choosing suitable testing methods and integrating them into process.
Optional exam-style reflection question
๐ Exam practice
๐ Exam practice
A manager wants to verify how an external attacker could exploit a running web application without access to source code. Which testing approach is most appropriate.
Short answer: Use dynamic application security testing or a black box penetration test. Both assess the running application from an external perspective without needing source code.