Content-type: text/html P-12 Adversary Principle

P-12 Adversary Principle

Copyright(c), 1995 - Management Analytics and Others - All Rights Reserved


Check all that apply:



Controls, security strategies, architectures, policies, standards, procedures, and guidelines are developed and implemented in anticipation of attack from intelligent, rational, and irrational adversaries with harmful intent or harm from negligent or accidental actions.
The dependency structure of the organization with respect to the firewall has been characterized and documented and was used as part of the development of the controls, security strategies, architectures, policies, standards, procedures, and guidelines.
Known and anticipated vulnerabilities have been identified and resolutions prioritized in precidence order.
A threat profile appropriate to the organization has been identified and characterized as part of the development of the controls, security strategies, architectures, policies, standards, procedures, and guidelines.
The controls, security strategies, architectures, policies, standards, procedures, and guidelines anticipate the objectives, expertise, and funding of potential adversaries and apply adequate and appropriate resources to protective measures.
Any system or interface that is not controlled is assumed to have been compromised.

With maximum value of