Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
R
RiskED
Manage
Activity
Members
Labels
Plan
Issues
0
Issue boards
Milestones
Wiki
Requirements
Code
Merge requests
0
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Locked files
Build
Pipelines
Jobs
Pipeline schedules
Test cases
Artifacts
Deploy
Releases
Package Registry
Container Registry
Model registry
Operate
Environments
Terraform modules
Monitor
Incidents
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Code review analytics
Issue analytics
Insights
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Ayodeji Rotibi
RiskED
Commits
6e4aa020
Commit
6e4aa020
authored
1 year ago
by
Ayodeji Rotibi
Browse files
Options
Downloads
Patches
Plain Diff
Upload New File
parent
e06eb1e4
No related branches found
No related tags found
No related merge requests found
Pipeline
#41415
failed with stages
in 1 minute and 8 seconds
Changes
1
Pipelines
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
Converted_data.csv
+115
-0
115 additions, 0 deletions
Converted_data.csv
with
115 additions
and
0 deletions
Converted_data.csv
0 → 100644
+
115
−
0
View file @
6e4aa020
Label#,Node,Child Node,Dependants,Probability
0,Secured System,,8,0.00
1,SPE1 ,Secured System,3,0.00
2,SPE2,Secured System,1,0.00
3,SPE3,Secured System,3,0.00
4,SPE4,Secured System,3,0.00
5,SPE5,Secured System,1,0.00
6,SPE6,Secured System,2,0.00
7,SPE7,Secured System,1,0.00
8,SPE8,Secured System,2,0.00
9,Security Related Organisation and Policies,SPE1,6,0.00
10,Security Assessments and Reviews,SPE1,3,0.00
11,Security of Physical Access,SPE1,1,0.00
12,Information Security Management System (ISMS),Security Related Organisation and Policies,0,0.67
13,Background Checks,Security Related Organisation and Policies,0,0.67
14,Security Roles and Responsibilities,Security Related Organisation and Policies,0,0.67
15,Security Awareness Training,Security Related Organisation and Policies,0,0.67
16,Security Responsibilities Training,Security Related Organisation and Policies,0,0.67
17,Supply Chain Security,Security Related Organisation and Policies,0,0.67
18,Security risk mitigation,Security Assessments and Reviews,0,0.67
19,Processes for discovery of security anomalies,Security Assessments and Reviews,0,0.67
20,Secure development and support,Security Assessments and Reviews,0,0.67
21,SP reviews,Security Assessments and Reviews,1,0.00
22,Physical access control,Security of Physical Access,0,1.00
23,Inventory Mgt of IACS HW-SW-NW,SPE2,4,0.00
24,Asset Inventory Baseline,Inventory Mgt of IACS HW-SW-NW,0,1.00
25,Infrastructure Drawings/Documentation,Inventory Mgt of IACS HW-SW-NW,0,1.00
26,Configuration Settings,Inventory Mgt of IACS HW-SW-NW,0,1.00
27,Change Control,Inventory Mgt of IACS HW-SW-NW,0,1.00
28,System Segmentation,SPE3,10,0.00
29,Secure Wireless Access,SPE3,3,0.00
30,Secure Remote Access,SPE3,3,0.00
31,Segmentation from non-IACS Networks,System Segmentation,0,0.67
32,Documentation of Network Segment Interconnections,System Segmentation,0,0.67
33,Network Segmentation from Safety Systems,System Segmentation,0,0.67
34,Network Autonomy,System Segmentation,0,0.67
35,Network Disconnection from External Networks,System Segmentation,0,0.67
36,Internal Network Access Control,System Segmentation,0,0.67
37,Device Connections,System Segmentation,0,0.67
38,Network Accessible Services,System Segmentation,0,0.67
39,User Messaging,System Segmentation,0,0.67
40,Network Time Distribution,System Segmentation,0,0.67
41,Wireless Protocols,Secure Wireless Access,0,0.00
42,Wireless Network Segmentation,Secure Wireless Access,0,0.00
43,Wireless Properties and Addresses,Secure Wireless Access,0,0.00
44,Remote Access Applications,Secure Remote Access,0,0.67
45,Remote Access Connections,Secure Remote Access,0,0.67
46,Remote Access Termination,Secure Remote Access,0,0.67
47,Devices and Media,SPE4,2,0.00
48,Malware Protection,SPE4,3,0.00
49,Patch Management,SPE4,5,0.00
50,Device Hardening,Devices and Media,0,0.00
51,Dedicated Portable Media,Devices and Media,0,1.00
52,Malware Free,Malware Protection,0,0.00
53,Malware Protection Software Validation and Installation,Malware Protection,0,0.00
54,Security Patch Authenticity Integrity,Patch Management,0,0.00
55,Security Patch Validation and Installation,Patch Management,0,0.00
56,Security Patch Status,Patch Management,0,0.00
57,Security Patching Retention of Security,Patch Management,0,0.00
58,Security Patch Mitigation,Patch Management,0,0.00
59,Protection of Data,SPE5,9,0.00
60,Data Classification,Protection of Data,0,1.00
61,Data Protection,Protection of Data,0,1.00
62,Safety System Configuration Mode,Protection of Data,0,1.00
63,Failure-State,Protection of Data,0,1.00
64,Data Retention,Protection of Data,0,1.00
65,Data Purging,Protection of Data,0,1.00
66,Cryptographic Mechanisms,Protection of Data,0,1.00
67,Key Management,Protection of Data,0,1.00
68,Public Key Infrastructure (PKI),Protection of Data,0,1.00
69,Identification and authentication1,SPE6,9,0.00
70,Identification and authentication2,SPE6,9,0.00
71,Authorization and access control,SPE6,4,0.00
72,User identity assignment,Identification and authentication1,0,1.00
73,User identity removal,Identification and authentication1,0,1.00
74,User identity persistence,Identification and authentication1,0,1.00
75,Access rights assignment,Identification and authentication1,0,1.00
76,Least privilege,Identification and authentication1,0,0.50
77,Software service authentication,Identification and authentication1,0,1.00
78,Software services interactive login rights,Identification and authentication1,0,1.00
79,User authentication,Identification and authentication1,0,1.00
80,Multifactor authentication,Identification and authentication1,0,0.50
81,Mutual authentication,Identification and authentication2,0,1.00
82,Password protection,Identification and authentication2,0,0.50
83,Shared and disclosed/compromised passwords,Identification and authentication2,0,0.50
84,User login display information,Identification and authentication2,0,0.50
85,User login failure displays,Identification and authentication2,0,0.50
86,Consecutive login failures,Identification and authentication2,0,1.00
87,Session integrity,Identification and authentication2,0,0.50
88,Concurrent sessions,Identification and authentication2,0,1.00
89,Screen lock,Identification and authentication2,0,1.00
90,Authorization,Authorization and access control,0,0.50
91,Administrative rights authorization,Authorization and access control,0,0.50
92,Multiple approvals,Authorization and access control,0,0.50
93,Manual elevation of privileges,Authorization and access control,0,0.50
94,Event and incident management,SPE7,9,0.00
95,Event detection,Event and incident management,0,0.50
96,Event reporting,Event and incident management,0,0.50
97,Event reporting interfaces,Event and incident management,0,0.50
98,Logging,Event and incident management,0,0.50
99,Log entries,Event and incident management,0,0.50
100,Log access,Event and incident management,0,0.50
101,Event analysis,Event and incident management,0,0.50
102,Incident handling and response,Event and incident management,0,0.50
103,Vulnerability handling,Event and incident management,0,0.50
104,System availability and intended functionality,SPE8,3,0.00
105,Backup/restore/archive,SPE8,5,0.00
106,Continuity management,System availability and intended functionality,0,0.50
107,Resource management,System availability and intended functionality,0,0.50
108,DoS attacks,System availability and intended functionality,0,0.50
109,Backup,Backup/restore/archive,0,0.50
110,Backup non-interference,Backup/restore/archive,0,0.50
111,Backup verification,Backup/restore/archive,0,0.50
112,Backup media,Backup/restore/archive,0,0.50
113,Backup restoration,Backup/restore/archive,0,0.50
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment