A security architect wants to implement a testing methodology that can identify insecure coding practices, such as potential SQL injection or buffer overflow vulnerabilities, by analyzing the application's source code without executing it. Which testing methodology should be chosen?
-
A
Dynamic Application Security Testing (DAST)
-
B
Interactive Application Security Testing (IAST)
-
C
Static Application Security Testing (SAST)
-
D
Fuzz Testing