Security profiles (EVL)Security profiles (EVL)\EVL - Basic usage

Basic usage is to introduce values for profile controls. Select the cell for a control, and a phase, then right click:

Graphical user interface, text, application ; ;Description automatically generated

PILAR applies the selected maturity to the selected control. Then, it is copied onto every child.

Graphical user interface, text, application ; ;Description automatically generated

 

So, you can set a general value for many controls, and refine the details later. When children have a range of values, the common father presents the maturity range:

 

Graphical user interface, text, application ; ;Description automatically generated

 

The value in one phase is used in following phases, unless changed.

Graphical user interface, text, application ; ;Description automatically generated

 

PILAR maps controls onto safeguards. This mapping is neither official, nor perfect. It is not official because security profiles are pieces of work from different sources, unrelated to PILAR. And it is not perfect for several reasons:

·       there may be no appropriate safeguard in PILAR to meet the control requirements

·       the same safeguard in PILAR may apply to more than one control

·       as PILAR evolves, the set of safeguards evolve

PILAR tries to do something reasonable.

 

 

When a safeguard is found in several mappings, change the value in one place has a ripple effect:

Graphical user interface, application ; ;Description automatically generated

 

We may find out the cross relations between controls by asking for the safeguards used in several places

            EXPAND > dual role

 

Top