Video upload date:  · Duration: PT1H46M27S  · Language: EN

In the process of securing a cloud-based iscc video

ccsp video for in the process of securing a cloud-based application, you are conducting a threat modeling exercise to identify potential security issues that

This is a dedicated watch page for a single video.

Full Certification Question

In the process of securing a cloud-based application, you are conducting a threat modeling exercise to identify potential security issues that could be exploited by adversaries. The application will handle sensitive data and interact with various cloud services. Which of the following methodologies would be least applicable as a primary focus during this threat modeling exercise?