A company maintains a widely used internal platform for managing customer information. The organization plans to integrate a new connection to a third-party marketing service. Which approach best addresses potential vulnerabilities introduced by this added functionality?
Stop outbound traffic to external services that are not maintained under direct oversight
Depend on firewall rules to control interactions between the platform and the marketing service
Analyze all data flows and define additional trust boundaries where external services meet internal processes
Run an automated scan on source code after the new feature is fully deployed
Reviewing data flow and architecture before integrating new services helps identify how trust boundaries are affected and where new vulnerabilities may emerge. This process allows teams to spot previously unmonitored entry points, ensuring layered security and limiting attack surface expansion. Scanning code or enforcing firewall rules alone cannot capture these architectural risks. Blocking external traffic entirely undermines business objectives without resolving underlying security concerns.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are trust boundaries in a system architecture?
Open an interactive chat with Bash
Why are data flow analyses important for identifying vulnerabilities?
Open an interactive chat with Bash
How do external integrations increase an attack surface?