A deployment manager is working with a software development group to assess the security of a new version of the organization’s internally developed ERP tool. The organization prefers to not perform assessment activities following deployment, instead focusing on assessing security throughout the life cycle.
Which of the following methods would BEST assess the security of the product?
A . Static code analysis in the IDE environment
B . Penetration testing of the UAT environment
C . Vulnerability scanning of the production environment
D . Penetration testing of the production environment
E . Peer review prior to unit testing