Barriers Library
Reusable barriers — prevention barriers sit on threat paths, mitigation barriers on consequence paths.
Add Barrier
Tags:
clear tags
4 barriers — page 1 of 1
| Name | Type | Category | Tags | Description | |
|---|---|---|---|---|---|
| Network Segmentation | prevention | Restricted Data Flow | Partition networks into security zones according to information classification, function, and trust … | Edit | |
| SR 5.2 – Zone Boundary Protection | prevention | Restricted Data Flow | The system shall monitor and control communications at the boundaries between security zones. All tr… | Edit | |
| SR 5.3 – General Purpose Person-to-Person Communication Restrictions | prevention | Restricted Data Flow | The system shall restrict use of general purpose communication services such as email, instant messa… | Edit | |
| SR 5.4 – Application Partitioning | prevention | Restricted Data Flow | The system shall separate user and control functionality and partition applications in accordance wi… | Edit |