Use of third-party libraries, Specific application issues, Enterprise Security Architecture