This is a dedicated watch page for a single video.
In the process of securing a cloud-based application, you are conducting a threat modeling exercise to identify potential security issues that could be exploited by adversaries. The application will handle sensitive data and interact with various cloud services. Which of the following methodologies would be least applicable as a primary focus during this threat modeling exercise?