
Your company decides to start the business of selling toys online and shipping globally. A software development team in-house has gone through analysis, design, development, and testing. Shortly after the E-Commerce system goes into operations, it suffers SQL injection attacks and data breach. As a security professional, which of the following is the best strategy to conduct threat modeling to mitigate risks?
A. In the initial design stage
B. In the testing stage
C. As late as in the operations stage
D. All of the above









