IDNameBaselinesPriorityThreats
    LowModerateHigh
    AU-8(2)Secondary Authoritative Time Source   
    • P1
    STRIDE-LM
    AU-9Protection Of Audit Information
    • P1
    STRIDE-LM
    (1)Hardware Write-Once Media   
    • P1
    STRIDE-LM
    (2)Audit Backup On Separate Physical Systems / Components  
    • P1
    STRIDE-LM
    (3)Cryptographic Protection  
    • P1
    STRIDE-LM
    (4)Access By Subset Of Privileged Users 
    • P1
    STRIDE-LM
    (5)Dual Authorization   
    • P1
    STRIDE-LM
    (6)Read Only Access   
    • P1
    STRIDE-LM
    AU-10Non-Repudiation  
    • P2
    STRIDE-LM
    (1)Association Of Identities   
    • P2
    STRIDE-LM
    (2)Validate Binding Of Information Producer Identity   
    • P2
    STRIDE-LM
    (3)Chain Of Custody   
    • P2
    STRIDE-LM
    (4)Validate Binding Of Information Reviewer Identity   
    • P2
    STRIDE-LM
    AU-11Audit Record Retention
    • P3
    STRIDE-LM
    (1)Long-Term Retrieval Capability   
    • P3
    STRIDE-LM
    AU-12Audit Generation
    • P1
    STRIDE-LM
    (1)System-Wide / Time-Correlated Audit Trail  
    • P1
    STRIDE-LM
    (2)Standardized Formats   
    • P1
    STRIDE-LM
    (3)Changes By Authorized Individuals  
    • P1
    STRIDE-LM
    AU-13Monitoring For Information Disclosure   
    • P0
    STRIDE-LM
    (1)Use Of Automated Tools   
    • P0
    STRIDE-LM
    (2)Review Of Monitored Sites   
    • P0
    STRIDE-LM
    AU-14Session Audit   
    • P0
    STRIDE-LM
    (1)System Start-Up   
    • P0
    STRIDE-LM
    (2)Capture/Record And Log Content   
    • P0
    STRIDE-LM
    (3)Remote Viewing / Listening   
    • P0
    STRIDE-LM
    AU-15Alternate Audit Capability   
    • P0
    STRIDE-LM
    AU-16Cross-Organizational Auditing   
    • P0
    STRIDE-LM
    (1)Identity Preservation   
    • P0
    STRIDE-LM
    (2)Sharing Of Audit Information   
    • P0
    STRIDE-LM
    CA-1Security Assessment And Authorization Policy And Procedures
    • P1
    STRIDE-LM
    CA-2Security Assessments
    • P2
    STRIDE-LM
    (1)Independent Assessors 
    • P2
    STRIDE-LM
    (2)Specialized Assessments  
    • P2
    STRIDE-LM
    (3)External Organizations   
    • P2
    STRIDE-LM
    CA-3System Interconnections
    • P1
    STRIDE-LM
    (1)Unclassified National Security System Connections   
    • P1
    STRIDE-LM
    (2)Classified National Security System Connections   
    • P1
    STRIDE-LM
    (3)Unclassified Non-National Security System Connections   
    • P1
    STRIDE-LM
    (4)Connections To Public Networks   
    • P1
    STRIDE-LM
    (5)Restrictions On External System Connections 
    • P1
    STRIDE-LM
    CA-5Plan Of Action And Milestones
    • P3
    STRIDE-LM
    (1)Automation Support For Accuracy / Currency   
    • P3
    STRIDE-LM
    CA-6Security Authorization
    • P2
    STRIDE-LM
    CA-7Continuous Monitoring
    • P2
    STRIDE-LM
    (1)Independent Assessment 
    • P2
    STRIDE-LM
    (3)Trend Analyses   
    • P2
    STRIDE-LM
    CA-8Penetration Testing  
    • P2
    STRIDE-LM
    (1)Independent Penetration Agent Or Team   
    • P2
    STRIDE-LM
    (2)Red Team Exercises   
    • P2
    STRIDE-LM