Skip to content
Snippets Groups Projects
Commit 6e4aa020 authored by Ayodeji Rotibi's avatar Ayodeji Rotibi
Browse files

Upload New File

parent e06eb1e4
No related branches found
No related tags found
No related merge requests found
Pipeline #41415 failed with stages
in 1 minute and 8 seconds
Label#,Node,Child Node,Dependants,Probability
0,Secured System,,8,0.00
1,SPE1 ,Secured System,3,0.00
2,SPE2,Secured System,1,0.00
3,SPE3,Secured System,3,0.00
4,SPE4,Secured System,3,0.00
5,SPE5,Secured System,1,0.00
6,SPE6,Secured System,2,0.00
7,SPE7,Secured System,1,0.00
8,SPE8,Secured System,2,0.00
9,Security Related Organisation and Policies,SPE1,6,0.00
10,Security Assessments and Reviews,SPE1,3,0.00
11,Security of Physical Access,SPE1,1,0.00
12,Information Security Management System (ISMS),Security Related Organisation and Policies,0,0.67
13,Background Checks,Security Related Organisation and Policies,0,0.67
14,Security Roles and Responsibilities,Security Related Organisation and Policies,0,0.67
15,Security Awareness Training,Security Related Organisation and Policies,0,0.67
16,Security Responsibilities Training,Security Related Organisation and Policies,0,0.67
17,Supply Chain Security,Security Related Organisation and Policies,0,0.67
18,Security risk mitigation,Security Assessments and Reviews,0,0.67
19,Processes for discovery of security anomalies,Security Assessments and Reviews,0,0.67
20,Secure development and support,Security Assessments and Reviews,0,0.67
21,SP reviews,Security Assessments and Reviews,1,0.00
22,Physical access control,Security of Physical Access,0,1.00
23,Inventory Mgt of IACS HW-SW-NW,SPE2,4,0.00
24,Asset Inventory Baseline,Inventory Mgt of IACS HW-SW-NW,0,1.00
25,Infrastructure Drawings/Documentation,Inventory Mgt of IACS HW-SW-NW,0,1.00
26,Configuration Settings,Inventory Mgt of IACS HW-SW-NW,0,1.00
27,Change Control,Inventory Mgt of IACS HW-SW-NW,0,1.00
28,System Segmentation,SPE3,10,0.00
29,Secure Wireless Access,SPE3,3,0.00
30,Secure Remote Access,SPE3,3,0.00
31,Segmentation from non-IACS Networks,System Segmentation,0,0.67
32,Documentation of Network Segment Interconnections,System Segmentation,0,0.67
33,Network Segmentation from Safety Systems,System Segmentation,0,0.67
34,Network Autonomy,System Segmentation,0,0.67
35,Network Disconnection from External Networks,System Segmentation,0,0.67
36,Internal Network Access Control,System Segmentation,0,0.67
37,Device Connections,System Segmentation,0,0.67
38,Network Accessible Services,System Segmentation,0,0.67
39,User Messaging,System Segmentation,0,0.67
40,Network Time Distribution,System Segmentation,0,0.67
41,Wireless Protocols,Secure Wireless Access,0,0.00
42,Wireless Network Segmentation,Secure Wireless Access,0,0.00
43,Wireless Properties and Addresses,Secure Wireless Access,0,0.00
44,Remote Access Applications,Secure Remote Access,0,0.67
45,Remote Access Connections,Secure Remote Access,0,0.67
46,Remote Access Termination,Secure Remote Access,0,0.67
47,Devices and Media,SPE4,2,0.00
48,Malware Protection,SPE4,3,0.00
49,Patch Management,SPE4,5,0.00
50,Device Hardening,Devices and Media,0,0.00
51,Dedicated Portable Media,Devices and Media,0,1.00
52,Malware Free,Malware Protection,0,0.00
53,Malware Protection Software Validation and Installation,Malware Protection,0,0.00
54,Security Patch Authenticity Integrity,Patch Management,0,0.00
55,Security Patch Validation and Installation,Patch Management,0,0.00
56,Security Patch Status,Patch Management,0,0.00
57,Security Patching Retention of Security,Patch Management,0,0.00
58,Security Patch Mitigation,Patch Management,0,0.00
59,Protection of Data,SPE5,9,0.00
60,Data Classification,Protection of Data,0,1.00
61,Data Protection,Protection of Data,0,1.00
62,Safety System Configuration Mode,Protection of Data,0,1.00
63,Failure-State,Protection of Data,0,1.00
64,Data Retention,Protection of Data,0,1.00
65,Data Purging,Protection of Data,0,1.00
66,Cryptographic Mechanisms,Protection of Data,0,1.00
67,Key Management,Protection of Data,0,1.00
68,Public Key Infrastructure (PKI),Protection of Data,0,1.00
69,Identification and authentication1,SPE6,9,0.00
70,Identification and authentication2,SPE6,9,0.00
71,Authorization and access control,SPE6,4,0.00
72,User identity assignment,Identification and authentication1,0,1.00
73,User identity removal,Identification and authentication1,0,1.00
74,User identity persistence,Identification and authentication1,0,1.00
75,Access rights assignment,Identification and authentication1,0,1.00
76,Least privilege,Identification and authentication1,0,0.50
77,Software service authentication,Identification and authentication1,0,1.00
78,Software services interactive login rights,Identification and authentication1,0,1.00
79,User authentication,Identification and authentication1,0,1.00
80,Multifactor authentication,Identification and authentication1,0,0.50
81,Mutual authentication,Identification and authentication2,0,1.00
82,Password protection,Identification and authentication2,0,0.50
83,Shared and disclosed/compromised passwords,Identification and authentication2,0,0.50
84,User login display information,Identification and authentication2,0,0.50
85,User login failure displays,Identification and authentication2,0,0.50
86,Consecutive login failures,Identification and authentication2,0,1.00
87,Session integrity,Identification and authentication2,0,0.50
88,Concurrent sessions,Identification and authentication2,0,1.00
89,Screen lock,Identification and authentication2,0,1.00
90,Authorization,Authorization and access control,0,0.50
91,Administrative rights authorization,Authorization and access control,0,0.50
92,Multiple approvals,Authorization and access control,0,0.50
93,Manual elevation of privileges,Authorization and access control,0,0.50
94,Event and incident management,SPE7,9,0.00
95,Event detection,Event and incident management,0,0.50
96,Event reporting,Event and incident management,0,0.50
97,Event reporting interfaces,Event and incident management,0,0.50
98,Logging,Event and incident management,0,0.50
99,Log entries,Event and incident management,0,0.50
100,Log access,Event and incident management,0,0.50
101,Event analysis,Event and incident management,0,0.50
102,Incident handling and response,Event and incident management,0,0.50
103,Vulnerability handling,Event and incident management,0,0.50
104,System availability and intended functionality,SPE8,3,0.00
105,Backup/restore/archive,SPE8,5,0.00
106,Continuity management,System availability and intended functionality,0,0.50
107,Resource management,System availability and intended functionality,0,0.50
108,DoS attacks,System availability and intended functionality,0,0.50
109,Backup,Backup/restore/archive,0,0.50
110,Backup non-interference,Backup/restore/archive,0,0.50
111,Backup verification,Backup/restore/archive,0,0.50
112,Backup media,Backup/restore/archive,0,0.50
113,Backup restoration,Backup/restore/archive,0,0.50
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment