Join us on Discord!
As a cloud security architect, you are tasked with enhancing the security posture of a cloud-based software development lifecycle (SDLC). Which of the following practices would be least effective in securing the SDLC against potential threats?