Barriers Library
Reusable barriers — prevention barriers sit on threat paths, mitigation barriers on consequence paths.
Add Barrier
Tags:
clear tags
44 barriers — page 1 of 1
| Name | Type | Category | Tags | Description | |
|---|---|---|---|---|---|
| SR 4.1 – Information Confidentiality | prevention | Data Confidentiality | The system shall protect the confidentiality of information at rest and in transit. Confidentiality … | Edit | |
| SR 4.2 – Information Persistence | prevention | Data Confidentiality | The system shall protect information from unauthorized access via reuse of storage resources. Residu… | Edit | |
| Use of Cryptography | prevention | Data Confidentiality | Apply cryptographic controls to protect the confidentiality and integrity of information at rest and… | Edit | |
| SR 1.1 – Human User Identification and Authentication | prevention | Identification and Authentication Control | The system shall identify and authenticate all human users. This requirement applies to all interfac… | Edit | |
| SR 1.10 – Authenticator Feedback | prevention | Identification and Authentication Control | The system shall obscure feedback of authentication information during the authentication process to… | Edit | |
| SR 1.11 – Unsuccessful Login Attempts | prevention | Identification and Authentication Control | The system shall enforce a limit on consecutive unsuccessful login attempts and apply a response suc… | Edit | |
| SR 1.12 – System Use Notification | prevention | Identification and Authentication Control | The system shall display an approved system use notification message before granting access, providi… | Edit | |
| SR 1.13 – Access via Untrusted Networks | prevention | Identification and Authentication Control | The system shall monitor and control all access to the control system via untrusted networks. Remote… | Edit | |
| SR 1.2 – Software Process and Device Identification and Authentication | prevention | Identification and Authentication Control | The system shall identify and authenticate all software processes and devices that attempt to access… | Edit | |
| SR 1.3 – Account Management | prevention | Identification and Authentication Control | The system shall support the management of accounts including creation, modification, disabling, and… | Edit | |
| SR 1.4 – Identifier Management | prevention | Identification and Authentication Control | The system shall support and enforce identifier management policies, including unique identifiers pe… | Edit | |
| SR 1.5 – Authenticator Management | prevention | Identification and Authentication Control | The system shall enforce authenticator management practices including initial generation, distributi… | Edit | |
| SR 1.6 – Wireless Access Management | prevention | Identification and Authentication Control | The system shall identify and authenticate wireless access to the control system using recognized go… | Edit | |
| SR 1.7 – Strength of Password-Based Authentication | prevention | Identification and Authentication Control | The system shall enforce minimum password strength requirements such as length, complexity, and hist… | Edit | |
| Asset Inventory | prevention | Resource Availability | Maintain an accurate, up-to-date inventory of all information assets and associated systems, includi… | Edit | |
| Information and System Backup | mitigation | Resource Availability | Take regular backups of data, software, and system images in accordance with an agreed backup policy… | Edit | |
| SR 7.1 – Denial of Service Protection | prevention | Resource Availability | The system shall protect against denial of service (DoS) attacks that could degrade or interrupt the… | Edit | |
| SR 7.2 – Resource Management | prevention | Resource Availability | The system shall manage the use of resources including processor capacity, memory, storage, and netw… | Edit | |
| SR 7.4 – Control System Recovery and Reconstitution | mitigation | Resource Availability | The system shall provide the capability to recover and reconstitute the control system to a known se… | Edit | |
| SR 7.5 – Emergency Power | mitigation | Resource Availability | The system shall provide an emergency power supply to ensure continued operation of critical control… | Edit | |
| SR 7.6 – Network and Security Configuration Settings | prevention | Resource Availability | The system shall manage network and security configuration settings to maintain a known, secure base… | Edit | |
| SR 7.7 – Least Functionality | prevention | Resource Availability | The system shall be configured to provide only the functions, ports, protocols, and services require… | Edit | |
| Network Segmentation | prevention | Restricted Data Flow | Partition networks into security zones according to information classification, function, and trust … | Edit | |
| SR 5.2 – Zone Boundary Protection | prevention | Restricted Data Flow | The system shall monitor and control communications at the boundaries between security zones. All tr… | Edit | |
| Malware / Malicious Code Protection | prevention | System Integrity | Employ protection mechanisms against malware at all relevant entry and exit points, including endpoi… | Edit | |
| SR 3.1 – Communication Integrity | prevention | System Integrity | The system shall protect the integrity of transmitted information to prevent unauthorized modificati… | Edit | |
| SR 3.3 – Security Functionality Verification | prevention | System Integrity | The system shall provide the capability to verify the correct operation of security functions on dem… | Edit | |
| SR 3.4 – Software and Information Integrity | prevention | System Integrity | The system shall employ integrity verification mechanisms to detect unauthorized changes to software… | Edit | |
| SR 3.5 – Input Validation | prevention | System Integrity | The system shall validate the syntax and semantics of inputs to prevent injection attacks and proces… | Edit | |
| SR 3.6 – Deterministic Output | prevention | System Integrity | The system shall produce deterministic output in response to inputs and provide appropriate handling… | Edit | |
| SR 3.7 – Error Handling | prevention | System Integrity | The system shall handle error conditions in a manner that does not generate information useful to an… | Edit | |
| SR 3.8 – Session Integrity | prevention | System Integrity | The system shall protect the integrity of sessions against hijacking and eavesdropping. Session toke… | Edit | |
| SR 3.9 – Protection of Audit Information | prevention | System Integrity | The system shall protect audit information and tools from unauthorized access, modification, and del… | Edit | |
| SR 6.1 – Audit Log Accessibility | mitigation | Timely Response to Events | The system shall ensure that audit logs are available to authorized personnel in a timely manner. Ac… | Edit | |
| SR 6.2 – Continuous Monitoring | mitigation | Timely Response to Events | The system shall implement continuous monitoring of security events across the control system enviro… | Edit | |
| SR 2.1 – Authorization Enforcement | prevention | Use Control | The system shall enforce assigned authorizations for all users and processes, controlling access to … | Edit | |
| SR 2.10 – Response to Audit Processing Failures | mitigation | Use Control | The system shall alert relevant personnel and take defined actions in the event that audit processin… | Edit | |
| SR 2.11 – Timestamps | prevention | Use Control | The system shall provide reliable, consistent timestamps for audit record generation. Timestamps sha… | Edit | |
| SR 2.2 – Wireless Use Control | prevention | Use Control | The system shall authorize, monitor, and control the use of wireless technologies including Wi-Fi, B… | Edit | |
| SR 2.3 – Use Control for Portable and Mobile Devices | prevention | Use Control | The system shall authorize, monitor, and control the use of portable and mobile devices such as USB … | Edit | |
| SR 2.5 – Session Lock | prevention | Use Control | The system shall implement a session lock after a configurable period of inactivity, requiring re-au… | Edit | |
| SR 2.6 – Remote Session Termination | prevention | Use Control | The system shall provide the capability to terminate remote sessions after a defined period of inact… | Edit | |
| SR 2.8 – Auditable Events | prevention | Use Control | The system shall generate audit records for defined auditable events including login attempts, acces… | Edit | |
| SR 2.9 – Audit Storage Capacity | prevention | Use Control | The system shall allocate sufficient audit record storage capacity and generate alerts when storage … | Edit |