• xPriority: P3: Implement P3 security controls after implementation of P1 and P2 controls.
IDNameBaselinesPriorityThreats
LowModerateHigh
AC-10Concurrent Session Control  
  • P3
STRIDE-LM
AC-11Session Lock 
  • P3
STRIDE-LM
(1)Pattern-Hiding Displays 
  • P3
STRIDE-LM
AC-14Permitted Actions Without Identification Or Authentication
  • P3
STRIDE-LM
AC-22Publicly Accessible Content
  • P3
STRIDE-LM
AT-4Security Training Records
  • P3
STRIDE-LM
AU-11Audit Record Retention
  • P3
STRIDE-LM
(1)Long-Term Retrieval Capability   
  • P3
STRIDE-LM
CA-5Plan Of Action And Milestones
  • P3
STRIDE-LM
(1)Automation Support For Accuracy / Currency   
  • P3
STRIDE-LM
MA-3Maintenance Tools 
  • P3
STRIDE-LM
(1)Inspect Tools 
  • P3
STRIDE-LM
(2)Inspect Media 
  • P3
STRIDE-LM
(3)Prevent Unauthorized Removal  
  • P3
STRIDE-LM
(4)Restricted Tool Use   
  • P3
STRIDE-LM
PE-8Visitor Access Records
  • P3
STRIDE-LM
(1)Automated Records Maintenance / Review  
  • P3
STRIDE-LM
PE-18Location Of Information System Components  
  • P3
STRIDE-LM
(1)Facility Site   
  • P3
STRIDE-LM
PS-6Access Agreements
  • P3
STRIDE-LM
(2)Classified Information Requiring Special Protection   
  • P3
STRIDE-LM
(3)Post-Employment Requirements   
  • P3
STRIDE-LM
PS-8Personnel Sanctions
  • P3
STRIDE-LM