INFORMATION SECURITY ARCHITECT SKILLS, EXPERIENCES, AND JOB REQUIREMENTS

Published: Aug 22, 2025 - The Information Security Architect possesses extensive expertise in cybersecurity, compliance, and risk mitigation across complex technology ecosystems. This role requires applying threat modeling methodologies, designing identity and access management solutions, and implementing countermeasures using tools. The architect also involves analyzing security data, evaluating cybersecurity products, and ensuring the secure deployment of cloud services in alignment with organizational standards.

Essential Hard and Soft Skills for an Information Security Architect Resume
  • Security Architecture
  • Risk Assessment
  • Vulnerability Management
  • Control Design
  • Incident Response
  • Security Compliance
  • Architecture Design
  • Tech Evaluation
  • Standards Development
  • System Evaluation
  • Stakeholder Engagement
  • Strategic Planning
  • Team Mentoring
  • Security Consulting
  • Client Engagement
  • Project Alignment
  • Design Leadership
  • Best Practices
  • Thought Leadership
  • Technical Communication

Summary of Information Security Architect Knowledge and Qualifications on Resume

1. BS in Information Technology with 7 years of Experience

  • Experience in an enterprise, solution or Security Architecture role or a related field
  • Experience in Enterprise or solution architecture using a recognized architecture methodology or framework (SABSA, TOGAF, Zachman)
  • Work experience in security technologies and practices (e.g., Intrusion Detection, Authentication Mechanisms, Enterprise Security tools, penetration testing etc.) with a broad understanding across multiple IT disciplines and emerging trends
  • Experience in public cloud security architecture such as Azure or AWS
  • Knowledge of Security Management frameworks (e.g., ISO 27002, COBIT, etc.)
  • Ability to document and communicate the status of progress against plans and take corrective actions
  • Ability to work effectively with internal business and technology partners at all levels of the organization
  • Able to support a work environment that promotes partner service, quality, innovation and teamwork
  • Expertise, knowledge and interest in additional security domains
  • Strong analytical and problem-solving skills

2. BS in Information Systems with 9 years of Experience

  • Demonstrable experience an information security architect or related
  • Experience managing the implementation of regional and global information security projects, initiatives and operational processes in concert with the relevant stakeholders and teams
  • Experience supporting businesses on impact assessments, security administration, third-party due diligence, penetration tests, vulnerability assessments, and security monitoring
  • Ability to present complex solutions and methods to a less technical audience, providing technical and non-technical thought-leadership and education of stakeholders
  • Strong analytical skills and the ability to resolve complex security vulnerabilities and design compensating controls
  • Ability to rapidly find, assimilate and correlate information correctly while under pressure
  • Advanced knowledge and experience auditing the Payment Card Industry-Data Security Standard (PCI-DSS), HIPAA/HI-TECH Act, or Cloud Information Security Controls (CCM)
  • Advanced knowledge and experience with the National Institute of Standards and Technology Cybersecurity Framework (NIST-CSF) and NIST special publications
  • Advanced knowledge and experience with one or more operating systems such as Windows, Unix/Linux, VMWare ESX, or Microsoft Hyper-V
  • Advanced knowledge and implementation experience with security hardening standards, such as the associated Center for Internet Security (CIS) Security benchmarks and tools such as Microsoft Windows Group Policy
  • Advanced knowledge and experience in drafting and reviewing technical, policy, procedures, standards, and audit documentation
  • Formal training or industry certification related to information technology security skills, such as an active CISSP certification, or a combination of GIAC, CISA, or Certificate of Cloud Security Knowledge (CCSK)
  • Demonstrated skills and validated work experience may be substituted for certifications, contingent upon a professional development plan for certification in Information Security within one year of hire is a condition of continued employment
  • Ability to successfully pass an in-depth background investigation

3. BS in Cybersecurity with 5 years of Experience

  • Work experience in several domains of security architecture (Operational Technologies, Software Development, Networking, Identity and Access Management, Mobility, etc.)
  • Proven experience in Security architecture, demonstrating solutions delivery, principles, and emerging technologies
  • Must have Certification as an Information Systems Security Architecture Professional (CISSP-ISSAP or equivalent certifications)
  • Exceptional communication skills with diverse audiences 
  • Strong critical thinking and analytical skills
  • Strong leadership, project, and team-building skills
  • Ability to lead teams and drive projects and initiatives in multiple departments
  • Demonstrated ability to identify risks associated with business processes, operations, information security programs, and technology projects
  • Ability to be the enterprise security subject matter expert who can explain technical topics to those without a technical background

4. BS in Computer Engineering with 8 years of Experience

  • Ability to serve as the top technical individual expert who can impart knowledge of architecture related to specific domains or a broad range of architecture frameworks, technologies, tools, processes, procedures and broader technologies and relevant issues
  • Advanced and highly specialized knowledge of TD applications, programming languages, industry best practices, the business and associated standards, infrastructure and architectural design and solutions and governance
  • Proven ability to work autonomously as an architectural specialist on high-profile, complex and high-risk technology projects with significant organizational impact
  • Demonstrated experience in providing technical leadership, consulting and direction to a larger team on all aspects of architecture to ensure advanced learning occurs
  • Able to foresight on architectural issues and gaps and can identify emerging industry trends (i.e., future-focused)
  • Strength in influencing product direction and integrating technology from an architectural perspective within the business environment and can fulfill an IT governance role
  • Proactive thinking when it comes to providing recommendations on value-added architectural improvements and enhancements
  • Capacity to take on one or more areas of focus (e.g., enterprise, data, application and technology architecture domains)
  • Experience in an enterprise or solution Security Architecture role or a related field
  • Knowledge of Security Management frameworks (e.g., ISO 27002, NIST CSF, COBIT etc.)
  • Ability to assess, develop, implement, optimize, and document a comprehensive set of security technologies and processes
  • Working knowledge of common and industry-standard modern authentication mechanisms (OAuth, OpenID, etc.)
  • Working knowledge of APIs, best practices and orchestration for cloud-based services

5. BS in Systems Engineering with 7 years of Experience

  • Experience in an information security role in a large, complex, multi-site organization
  • Complete cybersecurity certification such as Certified Information Systems Professional (CISSP), SANS/GIAC security certifications, or Certified Information Security Manager (CISM)
  • Extensive knowledge of information security principles, frameworks, standards, best practices, and industry trends
  • Experience culminating in a proven background in technology design, implementation, and delivery
  • Previous experience working in an Agile environment
  • Experience in architecting and building AWS environments
  • Experience documenting and presenting architectural patterns
  • Experience working with frameworks such as ISO 27001, PCI-DSS, NIST CSF, CIS
  • Experience working with technologies such as SIEM, FIM, DLP, SOAR, EDR, IPS, and PAM
  • Experience working in environments leveraging DevOps tools such as Terraform/Cloud formation, GitLab, Jira, and automated testing tools
  • Ability to effectively communicate risk from cybersecurity issues

6. BS in Software Engineering with 5 years of Experience

  • Must have CISSP, CCSP, CISM, TOGAF or other security and/or Enterprise Architecture methodology certifications
  • IT security and Identity Security Architecture experience
  • Experience with administering authentication technologies, such as Microsoft Active Directory/Windows authentication, OpenLDAP, Kerberos, OpenID Connect, OAuth, and federated identity management.
  • Basic familiarity with the principles of design thinking, lean and agile software delivery
  • Strong understanding of Secure Software Development Lifecycle (S-SDLC) and identity in cloud (Azure, Google, Amazon)
  • Knowledge of the healthcare industry and industry-related technology
  • General understanding and familiarity with protecting against web and web services security vulnerabilities including the OWASP Top Ten, SANS Top Twenty-Five
  • Experience in designing, architecting, and implementing complex enterprise applications, infrastructures with security built in
  • Fundamental working knowledge of industry-standard enterprise architecture models (e.g., TOGAF, NIST.SP.800-53r4, ISO 27002, SABSA, HIPAA, HITECH, PCI-DSS) and such security frameworks

7. BS in Telecommunications Engineering with 9 years of Experience

  • Experience in information security and information technology domains with a focus on security architecture or engineering
  • Solid understanding of security protocols, cryptography, authentication and authorisation
  • Knowledge of Identity and Access Management, networks, cloud, PKI, Active Directory/ADFS
  • Knowledge of current IT risks and experience implementing security solutions
  • Experience implementing multi-factor authentication, single sign-on, identity management or related technologies
  • Experience with privileged user management tools
  • Experience in architecture security within the Azure Cloud Platform
  • Familiarity with the Microsoft Azure security tools and features
  • Experience designing Mobile Device Management solutions
  • Experience in information security management/ISO 27001 certification
  • Ability to influence decisions at the management level
  • Ability to interact with a broad cross-section of personnel to explain and enforce security measures
  • Excellent written and verbal communication skills as well as business acumen and a commercial outlook

8. BS in Data Science with 6 years of Experience

  • Working experience in Information Security 
  • Working experience in Incident Response 
  • Forensic examination experience, including top tools (SIFT, Volatility, Magnet AXIOM, Autopsy, F-Response, and others)
  • Solid background in network and systems administration as they relate to security best practices, including cloud infrastructure
  • Familiarity with troubleshooting network communication and system configuration issues
  • Comprehension of top security threats (OWASP Top 10, SANS 25, NVD, etc.) and their remediation techniques
  • Familiarity with tools such as nmap, Wireshark, psexec, Nessus or similar solutions
  • Operational experience with the following: Firewalls, Vulnerability scanners, Intrusion Detection/Prevention systems, End Point Protection Systems, SIEM Log Management Systems
  • Working knowledge of the Electronic Discovery Reference Model (EDRM)
  • Ability to meet deadlines and Service Level Agreements (SLA's) while performing activities in a time-critical, highly confidential process
  • High level of discretion in dealing with sensitive and confidential information
  • Strong analytical and verbal skills

9. BS in Computer Networks with 7 years of Experience

  • Progressive technical information security experience
  • Substantial experience with application-aware firewall technologies and operating systems hardening
  • Ability to maintain strict control over verbal and written confidential instructions and data associated with all job duties in the information security team
  • Ability to work with others to gather needed data for research and investigations while withholding sensitive or confidential aspects of assigned work
  • Ability to acquire a broad knowledge of the organization and demonstrate understanding of how the company works from a variety of perspectives
  • Ability to describe specific problems from the perspective of each involved stakeholder and gain agreement on the problem-solving process, risk assessment, decision points, and criteria
  • Ability to summarize and present key decision points for security technologies in commercial use to business line leaders to support risk management decisions
  • Expert knowledge and ability to troubleshoot complex internetwork technology across multiple platforms including routing, firewall concepts, and major protocols (DNS, NTP, FTP, SFTP, SSH, SNMP, SMTP, ICMP, etc.)
  • Ability to research, troubleshoot, and manage encryption technologies including SSL/TLS, BitLocker, and similar broadly accepted encryption technologies on Windows, macOS, and Linux server platforms
  • Ability to configure and manage various security tools for enterprise use including SEIM, vulnerability scanners, file integrity tools, IDS/IPS, and identity management systems
  • Expert knowledge of common and advanced technical control techniques for workstation and server platforms

10. BS in Engineering Technology with 6 years of Experience

  • Ability to define requirements, identify products, and develop configurations to achieve controls
  • Knowledge and ability to configure and administer basic setup and security for enterprise versions of Windows (Windows 7 and later, Server 2008 and later) and Linux server platforms (RedHat, SuSe, Ubuntu)
  • Knowledge and ability to recognize and develop defenses against Internet and intranet security issues
  • Ability to develop and effectively lead solutions to protect the corporate environment from both external and internal attacks
  • Awareness of and ability to develop approaches to meet control requirements for PCI-DSS, SOX, and Nevada Gaming Control MICS
  • Ability to summarize and communicate technical issues to both technical and business personnel, both verbally and in the form of standards and technical procedure documentation
  • Ability to recognize, understand, and communicate non-technical aspects of inquiries and assignments
  • Ability to effectively prioritize and execute while multitasking in a high-pressure and ambiguous environment
  • Ability to recognize and communicate appropriate urgency and impact of work
  • Ability to effectively report on completed, current, and planned work in a business context
  • Ability to effectively maintain a professional demeanor and work both individually and in a team
  • Previous experience in a large, luxury resort setting

11. BA in Applied Mathematics with 8 years of Experience

  • Experience utilising emerging technologies to design and implement security solutions, monitoring and improving those solutions while working with an information security team
  • Background in consulting and engineering, the design and development of security best practices, implementation of security measures to meet business goals, customer needs and regulatory requirements
  • Security considerations of cloud computing across Microsoft Azure, AWS and Google Cloud Platform (GCP)
  • Thorough understanding of relevant industry security standards and protocols including ISO27001 and National Institute of Standards and Technology (NIST)
  • Ability to function as an enterprise security subject matter expert who can explain complex topics to those without a technical background
  • Strong leadership, stakeholder management, and project/team-building skills, including the ability to lead teams and drive initiatives in multiple departments
  • Work experience in information Security
  • Strong technology skills and an awareness of the information security challenges faced by financial institutions, 
  • Working experience in Cloud security 
  • Deep understanding of current authentication, automation solutions/technologies (SAML/Oauth/Kubernetes/Openstack/Chef/Puppet/Ansible)
  • Deep understanding of forward-looking security concepts such as Zero Trust Networks
  • Excellent presentation and interpersonal skills
  • Proficiency in written and spoken English, German

12. BS in Network Security with 4 years of Experience

  • Technical knowledge of enterprise application architecture
  • Comprehensive security knowledge covering encryption technologies, application security, network architectures, communications security, security technologies, authentication methodologies, etc.
  • Working knowledge of information security frameworks, security standards and guidelines
  • Knowledge of security certifications and audits (ISO 27001, ISO 27018, SOC-1, SOC-2, etc.)
  • Excellent presentation and communication skills, both written and oral
  • Organized, adaptable, and highly detailed problem solver
  • Experience in SaaS, cloud computing, enterprise software or social network environment
  • Experience in technical pre-sales or customer-facing roles 

13. BS in Computer Information Systems with 7 years of Experience

  • Able to interface with and gain the respect of stakeholders at all levels and roles in the company
  • Able to be a confident, energetic self-starter, with strong interpersonal skills
  • Must have good judgment, a sense of urgency and have demonstrated commitment to high standards of ethics, regulatory compliance, customer service and business integrity
  • Strong problem-solving and troubleshooting skills
  • Experience in using architecture methodologies such as SABSA, Zachman and/or TOGAF
  • Direct, hands-on experience or strong working knowledge of managing security infrastructure - e.g., firewalls, intrusion prevention systems (IPSs), web application firewalls (WAFs), endpoint protection, SIEM and log management technology
  • Experience reviewing application code for security vulnerabilities
  • Experience securing CI/CD pipelines
  • Direct, hands-on experience or a strong working knowledge of vulnerability management tools
  • Documented experience and a strong working knowledge of the methodologies to conduct threat-modeling exercises on new applications and services
  • Experience designing the deployment of applications and infrastructure into public cloud services
  • Full-stack knowledge of IT infrastructure

14. BS in Industrial Engineering with 5 years of Experience

  • Progressive Information Technology experience
  • Leadership and strategic experience
  • Ability to work through ambiguous and open-ended business requirements and priorities
  • Able to translate the same into a clear roadmap and definition of success
  • Excellent communication, problem-solving, and project management skills
  • Professional security certification (example: CISSP)
  • Experience in information security and/or IT risk management with a focus on security, performance, and reliability (or resilience)
  • Solid understanding of security protocols, standards, cryptography, authentication, authorization, and industry best practice security standards
  • Working knowledge of current IT risks and experience implementing (engineering) security solutions and controls
  • Demonstrate the company's core values of excellence, ownership, collaboration, and integrity

15. BS in Computer Science and Engineering with 10 years of Experience

  • Experience designing and deploying security for Business products and services and Enterprise solutions at the enterprise level
  • Must have Certification in one or more Information Security relevant areas such as Audit (CISA), Security Management (CISM), Security Professional (CISSP), Cloud Security (CCSP, CCSK, AZ500)
  • In-depth knowledge of security issues, techniques and implications across all existing computer platforms
  • Experience with evaluating and implementing security controls as related to Cloud-based services including SaaS, PaaS, IaaS
  • Strong computer skills to operate effectively with company systems and programs
  • Working knowledge of applicable computer applications used at ABC
  • Working knowledge of network solutions and systems
  • Good analytical and problem-solving skills
  • Ability to communicate effectively both orally and in writing
  • Must have good interpersonal skills
  • Ability to prioritize workload and consistently meet deadlines
  • Strong organizational skills and attention to detail
  • Ability to lead and provide direction to project/product teams
  • Strong consultative skills with the ability to interface effectively with technical and non-technical leaders
  • Understands Information Security as it relates to the business and other areas of IT and understands direct impacts and risks
  • Demonstrated sound understanding of at least 3 of the following control frameworks such as ISO 27001/27002, HITRUST, PCI, NIST, GDPR and PCI
  • Business experience in a matrix Organization 

16. BA in Applied Mathematics with 8 years of Experience

  • Application security architecture/development experience
  • Enterprise cloud security architecture experience
  • Deep understanding of common security protocols/standards/frameworks such as SAML, OpenID, OAuth, Central Authentication Service (CAS), JAAS, and Java crypto API etc.
  • Extensive work experience with encryption technologies and solutions
  • In-depth knowledge of OWASP top 10 vulnerabilities and remediation methods
  • Good understanding of database security (Oracle, MySQL, and MS SQL Server)
  • Experience with penetration testing and tools like Metasploit
  • Good understanding of software development process and tools such as Agile/Scrum, Maven, Jenkins and Git
  • Familiarity with DevOps and DevSecOps practices, container security and infrastructure as code tools and methodologies e.g., Terraform, GitOps, Zero Touch production, etc.
  • Knowledge of the Security Development Lifecycle and threat modeling
  • Experiences with static/dynamic security testing and common tools
  • Must be self-directed, able to work independently, as well as work in a team-oriented and fast-paced environment

17. BS in Data Science with 6 years of Experience

  • Ability to utilize emerging technologies to design and implement security solutions
  • Able to monitor and improve those solutions while working with an information security team
  • Proven ability to consult and engineer the design and development of security best practices
  • Experience with designing security solutions for on-premises and cloud computing, including protections against data breaches, hacking, account hijacking, malicious insiders, third parties, authentication attacks, APTs, data loss, and DoS attacks
  • Experience with identity and access management and privilege account management
  • Proven track and creating/enforcing policies that govern access to sensitive technology resources and information assets
  • Hands-on experience in an Information Security role
  • Banking and/or financial services industry experience
  • Strong communication, critical thinking, and analytical skills
  • Proven leadership, project and team-building skills, including the ability to lead teams and drive initiatives in multiple departments
  • Demonstrated ability to identify risks associated with business processes, operations, technology projects and information security programs

18. BS in Cybersecurity with 5 years of Experience

  • Ability to function as an enterprise security subject matter expert who can explain complex topics to those without a technical background
  • Self-motivated, organized and able to multitask, prioritize, and adhere to deadlines
  • Able to operate independently and effectively
  • Excellent written and verbal communication skills, demonstrating the ability to write with purpose, clarity, and accuracy to both technical and non-technical audiences
  • Detailed knowledge of the following areas: Windows and Linux Security, Networking Security, Vulnerability Management, Cloud Security, Identity and Access Management
  • Strong understanding of security concepts and hands-on with tools and systems such as firewalls, IDS/IPS, SIEM, manage antivirus/antimalware, patch management, NAC, DLP, and vulnerability scanners
  • Knowledge of risk assessment procedures, policy creation and compliance, understand and leverage security attack frameworks
  • Must have Programming knowledge (Perl, Python, C, PowerShell, Ruby, SOAP, XML, Java/Hadoop)
  • Knowledge of compliance and regulatory program requirements (such as HIPAA, ISO 27000, NIST, FISMA, and SOC standards)

19. BA in Mathematics with 4 years of Experience

  • Strong network engineering experience
  • Experience with next-generation firewalls, such as Checkpoint, Palo Alto, Cisco, etc.
  • Experience with web application firewalls, such as Palo Alto, Big IP, Cisco, etc.
  • Experience with IDS/IPS technologies
  • Experience implementing cloud-based security models and tools such as Zscaler, Cloudflare, and CASB tools
  • Hands-on experience with IaaS, SaaS, PaaS, Microsoft 365/Azure, AWS, and security models
  • Must have Security and network certifications such as CISSP, Security+, CCIE, CCSP, CEH, etc.
  • Development experience in C#, C++, Java, Python, or other Linux-based scripting
  • Experience with the application of threat modeling or other risk identification techniques

20. BS in Information Systems with 9 years of Experience

  • Experience designing, recommending, and reviewing security controls for complex applications and services
  • Expertise in multiple of the following domains: Security Infrastructure, Cloud Architecture, Web Frameworks, Identity and Access Management
  • Excellent communication skills (verbal and written) and interpersonal skills
  • Highly organised, structured and performance-driven
  • Strong relationship and collaboration skills
  • Personable, pro-active, professional and able to demonstrate full commitment to exceptional outcomes
  • Experience as a security architect or engineer
  • Experience with at least one of the industry standard security architecture frameworks, e.g., SABSA, NIST, etc.
  • Solid experience in technology and security risk management
  • Solid understanding of security protocols, cryptography, authentication, authorization, IAM, IPS, IDS, and security controls
  • Cloud experience with AWS and Azure
  • Experience with security technologies including Cisco, Check Point, CrowdStrike, Splunk, and CyberArk
  • Experience in HSMs, secure enclaves, secure vault technologies, confidential computing
  • Experience with zero-trust architectures and solutions
  • Ability to collaborate with both technical and business-aligned personnel
  • Excellent written and oral communication skills in English as well as business acumen

21. BS in Electrical Engineering with 10 years of Experience

  • Experience in cybersecurity architecture and design in networks, data centre systems, cloud infrastructure and platforms (IaaS security, PaaS security)
  • Experience in cloud architecture with knowledge of Azure and AWS services
  • Experience in delivering comprehensive architecture specifications for security solutions
  • Experience with security technologies, such as Firewalls, Intrusion Detection/Prevention Systems, Vulnerability Scanning, WAF, Wireless LAN, NAC, DLP, DDoS Mitigation, WAN security, SIEM, Content Filtering, Cloud Security gateways, Secure Proxies, and Crypto solutions
  • Experience in threat modelling of complex systems
  • Expertise and experience with Linux and Linux security
  • Understanding and ability to share knowledge on security principles in areas such as network, systems, virtualization, cloud technologies, access control, and cryptography
  • Ability to troubleshoot and resolve complex technical issues at an expert level
  • Experience integrating multiple vendor products
  • Hands-on experience and understanding of technology and enterprise security
  • Understanding of compliance, regulatory and legal requirements relevant to the Financial industry such as MAS, CSSF, FCA, etc.
  • Understanding of relevant Industry Principles, Best Practices, and Standards, such as NIST, ISO, CIS, OWASP, MITRE, CSA-CCM, etc.
  • Ability to function as an individual contributor and mentor/leader detached from the corporate environment
  • Experience with application security technologies like SAST, DAST, RASP, etc

22. BS in Applied Physics with 5 years of Experience

  • Experience in information security and/or IT risk management with a focus on performance and reliability
  • Solid understanding of security architectures, security protocols, security standards, encryption standards, access controls, authentication, authorization, and industry best practice security standards
  • Working knowledge of Data Privacy, PCI DSS, and sensitive data categories and security concepts
  • Working knowledge of current IT risks and experience implementing security solutions and controls
  • Ability to work through business requirements and translate them into a clear roadmap and deliverables
  • Ability to interact with groups and individuals to explain and guide security controls and compliance
  • Excellent written and verbal communication skills as well as business acumen
  • Must have a professional security certification such as CISSP

23. BS in Network and Communications Management with 8 years of Experience

  • Extensive experience in Information Security, compliance, assurance, and/or other security standard methodologies and principles
  • Documented experience and a strong working knowledge of the methodologies to conduct threat-modeling exercises on new applications and services
  • Experience applying cybersecurity and privacy principles and organizational requirements
  • Experience with developing specific cybersecurity countermeasures and risk mitigation strategies for systems and/or applications
  • Experience in identifying, assessing, and recommending cybersecurity or cybersecurity-enabled products for use within a system and ensuring that recommended products follow the organization's evaluation and validation requirements
  • Extensive experience with security data analysis using analytic tools such as Excel, SQL, and other query languages
  • Ability to effectively operate in support of a complex ecosystem of technology platforms managed by internal resources and vendor partners
  • Direct, hands-on experience managing security infrastructure such as firewalls, IPSs, WAFs, endpoint protection, SIEM and log management technology
  • Direct, hands-on experience using vulnerability management tools
  • Direct experience designing IAM technologies and services (e.g., Active Directory, LDAP, Azure AD)
  • Strong working knowledge of IT service management (e.g., ITIL-related disciplines)
  • Experience planning the security of cloud services (e.g., SaaS, PaaS, IaaS)