• xThreat Vector: Denial of Service
IDNameBaselinesPriorityThreats
LowModerateHigh
AU-4Audit Storage Capacity
  • P1
STRIDE-LM
(1)Transfer To Alternate Storage   
  • P1
STRIDE-LM
AU-5Response To Audit Processing Failures
  • P1
STRIDE-LM
(1)Audit Storage Capacity  
  • P1
STRIDE-LM
(2)Real-Time Alerts  
  • P1
STRIDE-LM
(3)Configurable Traffic Volume Thresholds   
  • P1
STRIDE-LM
AU-6Audit Review, Analysis, And Reporting
  • P1
STRIDE-LM
(3)Correlate Audit Repositories 
  • P1
STRIDE-LM
(5)Integration / Scanning And Monitoring Capabilities  
  • P1
STRIDE-LM
(6)Correlation With Physical Monitoring  
  • P1
STRIDE-LM
(9)Correlation With Information From Nontechnical Sources   
  • P1
STRIDE-LM
CP-6Alternate Storage Site 
  • P1
STRIDE-LM
(1)Separation From Primary Site 
  • P1
STRIDE-LM
(2)Recovery Time / Point Objectives  
  • P1
STRIDE-LM
(3)Accessibility 
  • P1
STRIDE-LM
CP-7Alternate Processing Site 
  • P1
STRIDE-LM
(1)Separation From Primary Site 
  • P1
STRIDE-LM
(2)Accessibility 
  • P1
STRIDE-LM
(3)Priority Of Service 
  • P1
STRIDE-LM
(4)Preparation For Use  
  • P1
STRIDE-LM
(6)Inability To Return To Primary Site   
  • P1
STRIDE-LM
CP-8Telecommunications Services 
  • P1
STRIDE-LM
(1)Priority Of Service Provisions 
  • P1
STRIDE-LM
(2)Single Points Of Failure 
  • P1
STRIDE-LM
(3)Separation Of Primary / Alternate Providers  
  • P1
STRIDE-LM
(4)Provider Contingency Plan  
  • P1
STRIDE-LM
(5)Alternate Telecommunication Service Testing   
  • P1
STRIDE-LM
CP-9Information System Backup
  • P1
STRIDE-LM
(1)Testing For Reliability / Integrity 
  • P1
STRIDE-LM
(2)Test Restoration Using Sampling  
  • P1
STRIDE-LM
(3)Separate Storage For Critical Information  
  • P1
STRIDE-LM
(5)Transfer To Alternate Storage Site  
  • P1
STRIDE-LM
(6)Redundant Secondary System   
  • P1
STRIDE-LM
(7)Dual Authorization   
  • P1
STRIDE-LM
CP-10Information System Recovery And Reconstitution
  • P1
STRIDE-LM
(2)Transaction Recovery 
  • P1
STRIDE-LM
(4)Restore Within Time Period  
  • P1
STRIDE-LM
(6)Component Protection   
  • P1
STRIDE-LM
CP-11Alternate Communications Protocols   
  • P0
STRIDE-LM
CP-13Alternative Security Mechanisms   
  • P0
STRIDE-LM
PE-9(1)Redundant Cabling   
  • P1
STRIDE-LM
(2)Automatic Voltage Controls   
  • P1
STRIDE-LM
SC-5Denial Of Service Protection
  • P1
STRIDE-LM
(1)Restrict Internal Users   
  • P1
STRIDE-LM
(2)Excess Capacity / Bandwidth / Redundancy   
  • P1
STRIDE-LM
(3)Detection / Monitoring   
  • P1
STRIDE-LM
SC-6Resource Availability   
  • P0
STRIDE-LM
SC-12(1)Availability  
  • P1
STRIDE-LM
SC-19Voice Over Internet Protocol 
  • P1
STRIDE-LM
SC-22Architecture And Provisioning For Name / Address Resolution Service
  • P1
STRIDE-LM