DAST
Dynamic Application Security TestingDynamic analysis that tests a running application like an external attacker.
DAST sends malicious requests to a deployed app to detect injections, broken auth, misconfigs. Complements SAST by testing runtime reality.
IaC Scanning
Infrastructure as Code ScanningAnalysis of Terraform, CloudFormation, Kubernetes files to detect dangerous configurations.
IaC scanning applies SAST logic to infrastructure: disabled encryption, open ports, over-permissive IAM, missing logs. Fixing in code rather than runtime reduces drift.
IAST
Interactive Application Security TestingHybrid analysis that instruments the running application to detect vulnerabilities with context.
IAST combines SAST and DAST strengths by instrumenting the app during testing. Fewer false positives but requires a dedicated runtime.
RASP
Runtime Application Self-ProtectionIn-app runtime protection that blocks attacks in real time in production.
RASP is embedded in the app and can detect/block exploits (RCE, SQLi…) at runtime. Unlike WAFs, it has full application context.
SAST
Static Application Security TestingStatic source code analysis to detect vulnerabilities without running the application.
SAST scans source code (or bytecode) for vulnerable patterns: injections, XSS, deserialization, weak crypto. Fast in CI but produces false positives that must be triaged.
SCA
Software Composition AnalysisOpen-source dependency analysis to detect known vulnerabilities and license issues.
SCA compares your project dependencies (npm, Maven, pip…) against databases like CVE/GHSA. Essential when 80–90% of a modern app's code is open source.
Secret Detection
Detection of secrets (API keys, tokens, credentials) committed in code.
Committed secrets are the #1 cause of cloud compromises. Tools scan git (pre-commit hook, CI, history) against patterns or ML models. Must be coupled with automatic rotation.