| pose |
|
Threat Agent |
Threat |
| |
|
Vulnerability |
IT Security Risk |
| |
|
Asset Value |
IT Security Risk |
| exploit |
|
Threat |
Vulnerability |
| |
|
Threat |
IT Security Risk |
| |
|
Recommended Security Control (SA&A process) |
Management Security Controls |
| |
|
Recommended Security Control (SA&A process) |
IT Security Risk |
| Implement and test |
|
Recommended Security Control (SA&A process) |
Security Capability |
| realize |
|
Recommended Security Control (SA&A process) |
IT Security Requirement |
| |
|
Recommended Security Control (SA&A process) |
Technical Security Control |
| |
|
Recommended Security Control (SA&A process) |
Operational Security Control |
| |
|
Implemented Security Control |
IT Security Requirement |
| |
|
Driver |
Goal |
| |
|
Business Requirements |
Solution Recommended |
| |
|
Constraint |
Business Requirements |
| |
|
Constraint |
Goal |
| has |
|
Asset |
Asset Value |
| |
|
Asset |
Capability |
| has |
|
Asset |
Vulnerability |
| |
|
Capability |
Business Requirements |
| |
|
Capability |
Solution Capability |
| |
|
Capability |
Other Capability |
| |
|
Capability |
Security Capability |
| |
|
IT Security Requirement |
Business Requirements |
| |
|
Stakeholder |
Driver |
| |
|
Solution Recommended |
Goal |
| |
|
Statement of Sensitivity |
Business Requirements |
| |
|
Security Analysis & Ranking |
Solution Recommended |