Which of the following assurance approaches is MOST effective in identifying vulnerabilities within an application programming interface (API) transferring personal data?
A new marketing application needs to use data from the organization's customer database. Prior to the application using the data, which of the following should be done FIRST?