Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
ChildOf | Discouraged | C | 666 | Operation on Resource in Wrong Phase of Lifetime |
ChildOf | Allowed-with-Review | C | 1390 | Weak Authentication |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 948 | SFP Secondary Cluster: Digital Certificate |
MemberOf | Prohibited | C | 1010 | Authenticate Actors |
MemberOf | Prohibited | C | 1396 | Comprehensive Categorization: Access Control |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | BS | BOSS-316 | Bypass Protection Mechanism (impact) |
MemberOf | Prohibited | BS | BOSS-328 | Read Application Data (impact) |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 1010 | Authenticate Actors |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 948 | SFP Secondary Cluster: Digital Certificate |
Scope | Likelihood | Impact | Note |
---|
Reference | Description |
---|
Ordinality | Description |
---|
Taxonomy Name | Entry ID | Fit | Entry Name |
---|
ID | Name |
---|