This view organizes weaknesses according to common architectural security tactics. It is intended to assist architects in identifying potential mistakes that can be made when designing software.
| Type | Description |
|---|---|
| Software Developers | Architects that are part of a software development team may find this view useful as the weaknesses are organized by known security tactics, aiding the arcitect in embedding security throughout the design process instead of discovering weaknesses after the software has been built. |
| Educators | Educators may use this view as reference material when discussing security by design or architectural weaknesses, and the types of mistakes that can be made. |