https://5dok.org/document/q5m90rj3-security-information-computing-identifying-mitigating-deployment-enterprise-applications.html