Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

The Risk Mitigation group replicates across the tables for threat scenarios, attack paths and attack steps. The drop-down lists in columns Requirement and Control provide all entries from corresponding catalogs located in the public folder in catalogs panel.

  • No labels