IDNameThreats
    CEK-18Key ArchivalSTRIDE-LM
    CEK-19Key CompromiseSTRIDE-LM
    CEK-20Key RecoverySTRIDE-LM
    CEK-21Key Inventory ManagementSTRIDE-LM
    DCS-01Off-Site Equipment Disposal Policy and ProceduresSTRIDE-LM
    DCS-02Off-Site Transfer Authorization Policy and ProceduresSTRIDE-LM
    DCS-03Secure Area Policy and ProceduresSTRIDE-LM
    DCS-04Secure Media Transportation Policy and ProceduresSTRIDE-LM
    DCS-05Assets ClassificationSTRIDE-LM
    DCS-06Assets Cataloguing and TrackingSTRIDE-LM
    DCS-07Controlled Access PointsSTRIDE-LM
    DCS-08Equipment IdentificationSTRIDE-LM
    DCS-09Secure Area AuthorizationSTRIDE-LM
    DCS-10Surveillance SystemSTRIDE-LM
    DCS-11Unauthorized Access Response TrainingSTRIDE-LM
    DCS-12Cabling SecuritySTRIDE-LM
    DCS-13Environmental SystemsSTRIDE-LM
    DCS-14Secure UtilitiesSTRIDE-LM
    DCS-15Equipment LocationSTRIDE-LM
    DSP-01Security and Privacy Policy and ProceduresSTRIDE-LM
    DSP-02Secure DisposalSTRIDE-LM
    DSP-03Data InventorySTRIDE-LM
    DSP-04Data ClassificationSTRIDE-LM
    DSP-05Data Flow DocumentationSTRIDE-LM
    DSP-06Data Ownership and StewardshipSTRIDE-LM
    DSP-07Data Protection by Design and DefaultSTRIDE-LM
    DSP-08Data Privacy by Design and DefaultSTRIDE-LM
    DSP-09Data Protection Impact AssessmentSTRIDE-LM
    DSP-10Sensitive Data TransferSTRIDE-LM
    DSP-11Personal Data Access, Reversal, Rectification and DeletionSTRIDE-LM
    DSP-12Limitation of Purpose in Personal Data ProcessingSTRIDE-LM
    DSP-13Personal Data Sub-processingSTRIDE-LM
    DSP-14Disclosure of Data Sub-processorsSTRIDE-LM
    DSP-15Limitation of Production Data UseSTRIDE-LM
    DSP-16Data Retention and DeletionSTRIDE-LM
    DSP-17Sensitive Data ProtectionSTRIDE-LM
    DSP-18Disclosure NotificationSTRIDE-LM
    DSP-19Data LocationSTRIDE-LM
    GRC-01Governance Program Policy and ProceduresSTRIDE-LM
    GRC-02Risk Management ProgramSTRIDE-LM
    GRC-03Organizational Policy ReviewsSTRIDE-LM
    GRC-04Policy Exception ProcessSTRIDE-LM
    GRC-05Information Security ProgramSTRIDE-LM
    GRC-06Governance Responsibility ModelSTRIDE-LM
    GRC-07Information System Regulatory MappingSTRIDE-LM
    GRC-08Special Interest GroupsSTRIDE-LM
    HRS-01Background Screening Policy and ProceduresSTRIDE-LM
    HRS-02Acceptable Use of Technology Policy and ProceduresSTRIDE-LM
    HRS-03Clean Desk Policy and ProceduresSTRIDE-LM
    HRS-04Remote and Home Working Policy and ProceduresSTRIDE-LM