Cloud, container, API, and mobile security validation — post-perimeter enterprise architecture governance for offensive security.