A security analyst is trying to explain attack methodology frameworks in the context of protecting cloud-based applications and data. Which of the following solutions can help the analyst in achieving this objective?
O Security orchestration, automation, and response (SOAR)
O Cloud access security broker (CASB) unselected
O Threat modeling unselected
O Public key infrastructure (PKI)