A recently hired security administrator is advising developers about the secure integration of a legacy in-house application with a new cloud based processing
system. The systems must exchange large amounts of fixed format data such as names, addresses, and phone numbers, as well as occasional chunks of data in
unpredictable formats. The developers want to construct a new data format and create custom tools to parse and process the data. The security administrator
instead suggests that the developers:
A.
Create a custom standard to define the data.
B.
Use well formed standard compliant XML and strict schemas.
C.
Only document the data format in the parsing application code.
D.
Implement a de facto corporate standard for all analyzed data.