• xThreat Vector: Denial of Service
IDNameImplementation GroupsThreats
IG1IG2IG3
8Audit Log Management   STRIDE-LM
8.3Ensure Adequate Audit Log StorageSTRIDE-LM
11Data Recovery   STRIDE-LM
11.2Perform Automated BackupsSTRIDE-LM
11.3Protect Recovery DataSTRIDE-LM
11.4Establish and Maintain an Isolated Instance of Recovery DataSTRIDE-LM
11.5Test Data Recovery STRIDE-LM
12Network Infrastructure Management   STRIDE-LM
12.1Ensure Network Infrastructure is Up-to-DateSTRIDE-LM