IDNameBaselinesPriorityThreats
    LowModerateHigh
    SI-7(13)Code Execution In Protected Environments   
    • P1
    STRIDE-LM
    (14)Binary Or Machine Executable Code  
    • P1
    STRIDE-LM
    (15)Code Authentication   
    • P1
    STRIDE-LM
    (16)Time Limit On Process Execution W/O Supervision   
    • P1
    STRIDE-LM
    SI-8Spam Protection 
    • P2
    STRIDE-LM
    (1)Central Management 
    • P2
    STRIDE-LM
    (2)Automatic Updates 
    • P2
    STRIDE-LM
    (3)Continuous Learning Capability   
    • P2
    STRIDE-LM
    SI-10Information Input Validation 
    • P1
    STRIDE-LM
    (1)Manual Override Capability   
    • P1
    STRIDE-LM
    (2)Review / Resolution Of Errors   
    • P1
    STRIDE-LM
    (3)Predictable Behavior   
    • P1
    STRIDE-LM
    (4)Review / Timing Interactions   
    • P1
    STRIDE-LM
    (5)Restrict Inputs To Trusted Sources And Approved Formats   
    • P1
    STRIDE-LM
    SI-11Error Handling 
    • P2
    STRIDE-LM
    SI-12Information Handling And Retention
    • P2
    STRIDE-LM
    SI-13Predictable Failure Prevention   
    • P0
    STRIDE-LM
    (1)Transferring Component Responsibilities   
    • P0
    STRIDE-LM
    (3)Manual Transfer Between Components   
    • P0
    STRIDE-LM
    (4)Standby Component Installation / Notification   
    • P0
    STRIDE-LM
    (5)Failover Capability   
    • P0
    STRIDE-LM
    SI-14Non-Persistence   
    • P0
    STRIDE-LM
    (1)Refresh From Trusted Sources   
    • P0
    STRIDE-LM
    SI-15Information Output Filtering   
    • P0
    STRIDE-LM
    SI-16Memory Protection 
    • P1
    STRIDE-LM
    SI-17Fail-Safe Procedures   
    • P0
    STRIDE-LM