Architectural Risk Analysis Reference Tables
Chapter 13 outlined the workflow of security architectural risk analysis and referenced several reference tables for baseline security requirements and mappings to risk sensitivity. These tables have been consolidated in this appendix for ease of reference.
Baseline Security Levels and Sample Controls
Table C.1 lists the Baseline Security Level requirements (from S5 to S1), along with some sample controls that might meet those requirements.
|Functional Requirements||Security Technology Controls|
|S5: Application Protocol and Session Filtering, Inspection, and Validation|
|S5.1. Traffic should be terminated, inspected, and reinitiated at the application ...|