IDNameThreats
    LOG-13Failures and Anomalies ReportingSTRIDE-LM
    SEF-01Security Incident Management Policy and ProceduresSTRIDE-LM
    SEF-02Service Management Policy and ProceduresSTRIDE-LM
    SEF-03Incident Response PlansSTRIDE-LM
    SEF-04Incident Response TestingSTRIDE-LM
    SEF-05Incident Response MetricsSTRIDE-LM
    SEF-06Event Triage ProcessesSTRIDE-LM
    SEF-07Security Breach NotificationSTRIDE-LM
    SEF-08Points of Contact MaintenanceSTRIDE-LM
    STA-01SSRM Policy and ProceduresSTRIDE-LM
    STA-02SSRM Supply ChainSTRIDE-LM
    STA-03SSRM GuidanceSTRIDE-LM
    STA-04SSRM Control OwnershipSTRIDE-LM
    STA-05SSRM Documentation ReviewSTRIDE-LM
    STA-06SSRM Control ImplementationSTRIDE-LM
    STA-07Supply Chain InventorySTRIDE-LM
    STA-08Supply Chain Risk ManagementSTRIDE-LM
    STA-09Primary Service and Contractual AgreementSTRIDE-LM
    STA-10Supply Chain Agreement ReviewSTRIDE-LM
    STA-11Internal Compliance TestingSTRIDE-LM
    STA-12Supply Chain Service Agreement ComplianceSTRIDE-LM
    STA-13Supply Chain Governance ReviewSTRIDE-LM
    STA-14Supply Chain Data Security AssessmentSTRIDE-LM
    TVM-01Threat and Vulnerability Management Policy and ProceduresSTRIDE-LM
    TVM-02Malware Protection Policy and ProceduresSTRIDE-LM
    TVM-03Vulnerability Remediation ScheduleSTRIDE-LM
    TVM-04Detection UpdatesSTRIDE-LM
    TVM-05External Library VulnerabilitiesSTRIDE-LM
    TVM-06Penetration TestingSTRIDE-LM
    TVM-07Vulnerability IdentificationSTRIDE-LM
    TVM-08Vulnerability PrioritizationSTRIDE-LM
    TVM-09Vulnerability Management ReportingSTRIDE-LM
    TVM-10Vulnerability Management MetricsSTRIDE-LM
    UEM-01Endpoint Devices Policy and ProceduresSTRIDE-LM
    UEM-02Application and Service ApprovalSTRIDE-LM
    UEM-03CompatibilitySTRIDE-LM
    UEM-04Endpoint InventorySTRIDE-LM
    UEM-05Endpoint ManagementSTRIDE-LM
    UEM-06Automatic Lock ScreenSTRIDE-LM
    UEM-07Operating SystemsSTRIDE-LM
    UEM-08Storage EncryptionSTRIDE-LM
    UEM-09Anti-Malware Detection and PreventionSTRIDE-LM
    UEM-10Software FirewallSTRIDE-LM
    UEM-11Data Loss PreventionSTRIDE-LM
    UEM-12Remote LocateSTRIDE-LM
    UEM-13Remote WipeSTRIDE-LM
    UEM-14Third-Party Endpoint Security PostureSTRIDE-LM