Can identify and advise on issues relating to weakly protected code repositories, for example: • Openly exposed repositories containing closed source code • Weak or insufficiently protected credentials • Understands the security implications of storing sensitive information in source code repositories, e.g. passwords, private cryptographic keys or API keys
Industry Roles:
Assessment Methods: