APPENDIX C
Architectural Risk Analysis Reference Tables
Chapter 13 outlined the workflow of security architectural risk analysis and referenced several reference tables for baseline security requirements and mappings to risk sensitivity. These tables have been consolidated in this appendix for ease of reference.
Baseline Security Levels and Sample Controls
Table C.1 lists the Baseline Security Level requirements (from S5 to S1), along with some sample controls that might meet those requirements.
Functional Requirements | Security Technology Controls |
S5: Application Protocol and Session Filtering, Inspection, and Validation | |
S5.1. Traffic should be terminated, inspected, and reinitiated at the application ... |
Get Security Risk Management now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.