Which of the following processes should be implemented to validate the application security of the
cloud provider’s SaaS application?
A.
Periodic integrity testing
B.
Periodic penetration testing
C.
Review of operating system configuration
D.
Application load testing