Describe the methods to mitigate the vulnerabilities, as they relate to the seven (7) domains.
2 paragraphs.