Barriers Library

Reusable barriers — prevention barriers sit on threat paths, mitigation barriers on consequence paths.

Add Barrier

Tags: clear tags
Clear all
9 barriers — page 1 of 1
Name Type Category Tags Description
Malware / Malicious Code Protection prevention System Integrity Employ protection mechanisms against malware at all relevant entry and exit points, including endpoi… Edit
SR 3.1 – Communication Integrity prevention System Integrity The system shall protect the integrity of transmitted information to prevent unauthorized modificati… Edit
SR 3.3 – Security Functionality Verification prevention System Integrity The system shall provide the capability to verify the correct operation of security functions on dem… Edit
SR 3.4 – Software and Information Integrity prevention System Integrity The system shall employ integrity verification mechanisms to detect unauthorized changes to software… Edit
SR 3.5 – Input Validation prevention System Integrity The system shall validate the syntax and semantics of inputs to prevent injection attacks and proces… Edit
SR 3.6 – Deterministic Output prevention System Integrity The system shall produce deterministic output in response to inputs and provide appropriate handling… Edit
SR 3.7 – Error Handling prevention System Integrity The system shall handle error conditions in a manner that does not generate information useful to an… Edit
SR 3.8 – Session Integrity prevention System Integrity The system shall protect the integrity of sessions against hijacking and eavesdropping. Session toke… Edit
SR 3.9 – Protection of Audit Information prevention System Integrity The system shall protect audit information and tools from unauthorized access, modification, and del… Edit