IDNameThreats
    MOS-05Awareness and TrainingSTRIDE-LM
    MOS-06Cloud Based ServicesSTRIDE-LM
    MOS-07CompatibilitySTRIDE-LM
    MOS-08Device EligibilitySTRIDE-LM
    MOS-09Device InventorySTRIDE-LM
    MOS-10Device ManagementSTRIDE-LM
    MOS-11EncryptionSTRIDE-LM
    MOS-12Jailbreaking and RootingSTRIDE-LM
    MOS-13LegalSTRIDE-LM
    MOS-14Lockout ScreenSTRIDE-LM
    MOS-15Operating SystemsSTRIDE-LM
    MOS-16PasswordsSTRIDE-LM
    MOS-17PolicySTRIDE-LM
    MOS-18Remote WipeSTRIDE-LM
    MOS-19Security PatchesSTRIDE-LM
    MOS-20UsersSTRIDE-LM
    SEF-01Contact / Authority MaintenanceSTRIDE-LM
    SEF-02Incident ManagementSTRIDE-LM
    SEF-03Incident ReportingSTRIDE-LM
    SEF-04Incident Response Legal PreparationSTRIDE-LM
    SEF-05Incident Response MetricsSTRIDE-LM
    STA-01Data Quality and IntegritySTRIDE-LM
    STA-02Incident ReportingSTRIDE-LM
    STA-03Network / Infrastructure ServicesSTRIDE-LM
    STA-04Provider Internal AssessmentsSTRIDE-LM
    STA-05Supply Chain AgreementsSTRIDE-LM
    STA-06Supply Chain Governance ReviewsSTRIDE-LM
    STA-07Supply Chain MetricsSTRIDE-LM
    STA-08Third Party AssessmentSTRIDE-LM
    STA-09Third Party AuditsSTRIDE-LM
    TVM-01Anti-Virus / Malicious SoftwareSTRIDE-LM
    TVM-02Vulnerability / Patch ManagementSTRIDE-LM
    TVM-03Mobile CodeSTRIDE-LM