Interactive application security testing: Difference between revisions

Content deleted Content added
Add banner {{Cleanup bare URLs}}. After at least 7 passes by @Citation bot, this article still has 3 untagged bare URLs
Citation bot (talk | contribs)
Add: title. Changed bare reference to CS1/2. | Use this bot. Report bugs. | Suggested by BrownHairedGirl | #UCB_webform 1502/1970
Line 2:
{{cleanup bare URLs|date=July 2022}}
 
'''Interactive application security testing''' (IAST) is a [[security testing]] method that detects software vulnerabilities by interaction with the program coupled with observation and sensors.<ref>{{cite web | url=https://owasp.org/www-project-devsecops-guideline/latest/02c-Interactive-Application-Security-Testing | title=OWASP DevSecOps Guideline - v-0.2 &#124; OWASP Foundation }}</ref><ref>{{cite web | url=https://www.softwaretestinghelp.com/what-is-iast/ | title=What is IAST: Interactive Application Security Testing }}</ref> It is distinct from [[static application security testing]], which does not interact with the program, and [[dynamic application security testing]], which considers the program as a [[black box]]. It may be considered a mix of both.<ref>https://www.g2.com/articles/sast-vs-dast</ref>
 
==References==