| 1. API inbound security pattern [Threat Model] |
|
| 1. API orchestration security pattern [Threat Model] |
|
| 2. API inbound security pattern [Control Realization] |
|
| 2. API orchestration security pattern [Control Realization] |
|
| 1. API inbound security pattern [Threat Model] |
|
| 2. API inbound security pattern [Control Realization] |
|
| [Legacy] 2. API inbound security pattern [Control Realization] |
|