IDNameThreats
    HRS-05Asset returnsSTRIDE-LM
    HRS-06Employment TerminationSTRIDE-LM
    HRS-07Employment Agreement ProcessSTRIDE-LM
    HRS-08Employment Agreement ContentSTRIDE-LM
    HRS-09Personnel Roles and ResponsibilitiesSTRIDE-LM
    HRS-10Non-Disclosure AgreementsSTRIDE-LM
    HRS-11Security Awareness TrainingSTRIDE-LM
    HRS-12Personal and Sensitive Data Awareness and TrainingSTRIDE-LM
    HRS-13Compliance User ResponsibilitySTRIDE-LM
    IAM-01Identity and Access Management Policy and ProceduresSTRIDE-LM
    IAM-02Strong Password Policy and ProceduresSTRIDE-LM
    IAM-03Identity InventorySTRIDE-LM
    IAM-04Separation of DutiesSTRIDE-LM
    IAM-05Least PrivilegeSTRIDE-LM
    IAM-06User Access ProvisioningSTRIDE-LM
    IAM-07User Access Changes and RevocationSTRIDE-LM
    IAM-08User Access ReviewSTRIDE-LM
    IAM-09Segregation of Privileged Access RolesSTRIDE-LM
    IAM-10Management of Privileged Access RolesSTRIDE-LM
    IAM-11CSCs Approval for Agreed Privileged Access RolesSTRIDE-LM
    IAM-12Safeguard Logs IntegritySTRIDE-LM
    IAM-13Uniquely Identifiable UsersSTRIDE-LM
    IAM-14Strong AuthenticationSTRIDE-LM
    IAM-15Passwords ManagementSTRIDE-LM
    IAM-16Authorization MechanismsSTRIDE-LM
    IPY-01Interoperability and Portability Policy and ProceduresSTRIDE-LM
    IPY-02Application Interface AvailabilitySTRIDE-LM
    IPY-03Secure Interoperability and Portability ManagementSTRIDE-LM
    IPY-04Data Portability Contractual ObligationsSTRIDE-LM
    IVS-01Infrastructure and Virtualization Security Policy and ProceduresSTRIDE-LM
    IVS-02Capacity and Resource PlanningSTRIDE-LM
    IVS-03Network SecuritySTRIDE-LM
    IVS-04OS Hardening and Base ControlsSTRIDE-LM
    IVS-05Production and Non-Production EnvironmentsSTRIDE-LM
    IVS-06Segmentation and SegregationSTRIDE-LM
    IVS-07Migration to Cloud EnvironmentsSTRIDE-LM
    IVS-08Network Architecture DocumentationSTRIDE-LM
    IVS-09Network DefenseSTRIDE-LM
    LOG-01Logging and Monitoring Policy and ProceduresSTRIDE-LM
    LOG-02Audit Logs ProtectionSTRIDE-LM
    LOG-03Security Monitoring and AlertingSTRIDE-LM
    LOG-04Audit Logs Access and AccountabilitySTRIDE-LM
    LOG-05Audit Logs Monitoring and ResponseSTRIDE-LM
    LOG-06Clock SynchronizationSTRIDE-LM
    LOG-07Logging ScopeSTRIDE-LM
    LOG-08Log RecordsSTRIDE-LM
    LOG-09Log ProtectionSTRIDE-LM
    LOG-10Encryption Monitoring and ReportingSTRIDE-LM
    LOG-11Transaction/Activity LoggingSTRIDE-LM
    LOG-12Access Control LogsSTRIDE-LM