3.5 Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
- 3.5.1 Client-based systems
- 3.5.2 Server-based systems
- 3.5.3 Database systems
- 3.5.4 Cryptographic Systems
- 3.5.5 Operational Technology / Industrial Control Systems (ICS)
- 3.5.6 Cloud-based Systems
- 3.5.7 Distributed Systems
- 3.5.8 Internet of Things (IOT)
- 3.5.9 Microservices
- 3.5.10 Containerization
- 3.5.11 Serverless Computing
- 3.5.12 Embedded systems
- 3.5.13 High-Performance Computing systems
- 3.5.14 Edge Computing Systems
- 3.5.15 Virtualized systems