“…Second, it is typically specific to the system domain and underlying infrastructure. Research dealing with risk analysis, e.g., [20]- [23], as a design time activity is related to our work, i.e., it would be needed to identify and model Problematic Configuration Patterns (PCPs) and how to resolve them (see section IV for details on PCPs) as suggested by our approach. Our approach is agnostic to a specific risk analysis approach, therefore it could be seen as complimentary research.…”