Mitigations for "External connectivity and connections" Mitigations to the threats which are related to "external connectivity and connections" are listed in Table B4.