Barriers Library
Reusable barriers — prevention barriers sit on threat paths, mitigation barriers on consequence paths.
Add Barrier
Tags:
clear tags
9 barriers — page 1 of 1
| Name | Type | Category | Tags | Description | |
|---|---|---|---|---|---|
| Malware / Malicious Code Protection | prevention | System Integrity | Employ protection mechanisms against malware at all relevant entry and exit points, including endpoi… | Edit | |
| SR 3.1 – Communication Integrity | prevention | System Integrity | The system shall protect the integrity of transmitted information to prevent unauthorized modificati… | Edit | |
| SR 3.3 – Security Functionality Verification | prevention | System Integrity | The system shall provide the capability to verify the correct operation of security functions on dem… | Edit | |
| SR 3.4 – Software and Information Integrity | prevention | System Integrity | The system shall employ integrity verification mechanisms to detect unauthorized changes to software… | Edit | |
| SR 3.5 – Input Validation | prevention | System Integrity | The system shall validate the syntax and semantics of inputs to prevent injection attacks and proces… | Edit | |
| SR 3.6 – Deterministic Output | prevention | System Integrity | The system shall produce deterministic output in response to inputs and provide appropriate handling… | Edit | |
| SR 3.7 – Error Handling | prevention | System Integrity | The system shall handle error conditions in a manner that does not generate information useful to an… | Edit | |
| SR 3.8 – Session Integrity | prevention | System Integrity | The system shall protect the integrity of sessions against hijacking and eavesdropping. Session toke… | Edit | |
| SR 3.9 – Protection of Audit Information | prevention | System Integrity | The system shall protect audit information and tools from unauthorized access, modification, and del… | Edit |