Barriers Library
Reusable barriers — prevention barriers sit on threat paths, mitigation barriers on consequence paths.
Add Barrier
Tags:
3 barriers — page 1 of 1
| Name | Type | Category | Tags | Description | |
|---|---|---|---|---|---|
| SR 4.1 – Information Confidentiality | prevention | Data Confidentiality | The system shall protect the confidentiality of information at rest and in transit. Confidentiality … | Edit | |
| SR 4.2 – Information Persistence | prevention | Data Confidentiality | The system shall protect information from unauthorized access via reuse of storage resources. Residu… | Edit | |
| Use of Cryptography | prevention | Data Confidentiality | Apply cryptographic controls to protect the confidentiality and integrity of information at rest and… | Edit |