APPENDIX C

Architectural Risk Analysis Reference Tables

Chapter 13 outlined the workflow of security architectural risk analysis and referenced several reference tables for baseline security requirements and mappings to risk sensitivity. These tables have been consolidated in this appendix for ease of reference.

Baseline Security Levels and Sample Controls

Table C.1 lists the Baseline Security Level requirements (from S5 to S1), along with some sample controls that might meet those requirements.

Table C.1 Security Baseline Levels

Functional Requirements Security Technology Controls
S5: Application Protocol and Session Filtering, Inspection, and Validation
S5.1. Traffic should be terminated, inspected, and reinitiated at the application ...

Get Security Risk Management now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.