APPENDIX C

Architectural Risk Analysis Reference Tables

Chapter 13 outlined the workflow of security architectural risk analysis and referenced several reference tables for baseline security requirements and mappings to risk sensitivity. These tables have been consolidated in this appendix for ease of reference.

Baseline Security Levels and Sample Controls

Table C.1 lists the Baseline Security Level requirements (from S5 to S1), along with some sample controls that might meet those requirements.

Table C.1 Security Baseline Levels

Functional Requirements Security Technology Controls
S5: Application Protocol and Session Filtering, Inspection, and Validation
S5.1. Traffic should be terminated, inspected, and reinitiated at the application ...

Get Security Risk Management now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.