Watch this video on YouTube
Which security practice focuses on ensuring that software components are securely combined and interact with each other without introducing vulnerabilities?