| SAST |
Static Application Security Testing |
Analyzes code or binaries to find vulnerabilities before runtime. |
Static |
| Secure Code Review |
— |
Manual or automated inspection of code for security flaws. |
Static |
| DAST |
Dynamic Application Security Testing |
Simulates attacks on a running application to find security issues. |
Dynamic |
| Fuzzing |
Fuzz Testing |
Sends malformed or random data to discover crashes and bugs. |
Dynamic |
| Pen Testing |
Penetration Testing |
Ethical hacking to uncover and exploit real-world vulnerabilities. |
Dynamic |
| IAST |
Interactive Application Security Testing |
Combines SAST and DAST with real-time analysis via instrumentation. |
Hybrid |
| RASP |
Runtime Application Self-Protection |
Monitors and protects applications in real-time during execution. |
Hybrid |
| SCA |
Software Composition Analysis |
Identifies vulnerabilities in open-source and third-party components. |
Component-based |
| VAPT |
Vulnerability Assessment and Penetration Testing |
Combines scanning and exploitation to assess security posture. |
Operational |
| Threat Modeling |
— |
Identifies and prioritizes threats early in the development lifecycle. |
Operational |
| Bug Bounty |
— |
Rewards external security researchers for responsibly reporting vulnerabilities. |
Operational |