Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
R
RiskED
Manage
Activity
Members
Labels
Plan
Issues
0
Issue boards
Milestones
Wiki
Requirements
Code
Merge requests
0
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Locked files
Build
Pipelines
Jobs
Pipeline schedules
Test cases
Artifacts
Deploy
Releases
Package Registry
Container Registry
Model registry
Operate
Environments
Terraform modules
Monitor
Incidents
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Code review analytics
Issue analytics
Insights
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Ayodeji Rotibi
RiskED
Commits
c11be73e
Commit
c11be73e
authored
1 year ago
by
Ayodeji Rotibi
Browse files
Options
Downloads
Patches
Plain Diff
Upload New File
parent
61918fa1
No related branches found
No related tags found
No related merge requests found
Pipeline
#41485
failed with stages
in 1 minute and 15 seconds
Changes
1
Pipelines
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
modellist.csv
+115
-0
115 additions, 0 deletions
modellist.csv
with
115 additions
and
0 deletions
modellist.csv
0 → 100644
+
115
−
0
View file @
c11be73e
Label #,Node Name
0,Secured System
1,SPE1
2,SPE2
3,SPE3
4,SPE4
5,SPE5
6,SPE6
7,SPE7
8,SPE8
9,Security Related Organisation and Policies
10,Security Assessments and Reviews
11,Security of Physical Access
12,Information Security Management System (ISMS)
13,Background Checks
14,Security Roles and Responsibilities
15,Security Awareness Training
16,Security Responsibilities Training
17,Supply Chain Security
18,Security risk mitigation
19,Processes for discovery of security anomalies
20,Secure development and support
21,SP reviews
22,Physical access control
23,Inventory Mgt of IACS HW-SW-NW
24,Asset Inventory Baseline
25,Infrastructure Drawings/Documentation
26,Configuration Settings
27,Change Control
28,System Segmentation
29,Secure Wireless Access
30,Secure Remote Access
31,Segmentation from non-IACS Networks
32,Documentation of Network Segment Interconnections
33,Network Segmentation from Safety Systems
34,Network Autonomy
35,Network Disconnection from External Networks
36,Internal Network Access Control
37,Device Connections
38,Network Accessible Services
39,User Messaging
40,Network Time Distribution
41,Wireless Protocols
42,Wireless Network Segmentation
43,Wireless Properties and Addresses
44,Remote Access Applications
45,Remote Access Connections
46,Remote Access Termination
47,Devices and Media
48,Malware Protection
49,Patch Management
50,Device Hardening
51,Dedicated Portable Media
52,Malware Free
53,Malware Protection Software Validation and Installation
54,Security Patch Authenticity Integrity
55,Security Patch Validation and Installation
56,Security Patch Status
57,Security Patching Retention of Security
58,Security Patch Mitigation
59,Protection of Data
60,Data Classification
61,Data Protection
62,Safety System Configuration Mode
63,Failure-State
64,Data Retention
65,Data Purging
66,Cryptographic Mechanisms
67,Key Management
68,Public Key Infrastructure (PKI)
69,Identification and authentication1
70,Identification and authentication2
71,Authorization and access control
72,User identity assignment
73,User identity removal
74,User identity persistence
75,Access rights assignment
76,Least privilege
77,Software service authentication
78,Software services interactive login rights
79,User authentication
80,Multifactor authentication
81,Mutual authentication
82,Password protection
83,Shared and disclosed/compromised passwords
84,User login display information
85,User login failure displays
86,Consecutive login failures
87,Session integrity
88,Concurrent sessions
89,Screen lock
90,Authorization
91,Administrative rights authorization
92,Multiple approvals
93,Manual elevation of privileges
94,Event and incident management
95,Event detection
96,Event reporting
97,Event reporting interfaces
98,Logging
99,Log entries
100,Log access
101,Event analysis
102,Incident handling and response
103,Vulnerability handling
104,System availability and intended functionality
105,Backup/restore/archive
106,Continuity management
107,Resource management
108,DoS attacks
109,Backup
110,Backup non-interference
111,Backup verification
112,Backup media
113,Backup restoration
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment