An existing application has never been assessed from a security perspective. Which of the following is the BEST assessment technique in order to identify the application’s security posture?
A.
Baseline reporting
B.
Protocol analysis
C.
Threat modeling
D.
Functional testing