Data Port
Identify relevant process risks DP
Assess risks ICS ERM
Description
Data Mapping
Mapping Source
Mapping Target
D21 Relevant threats
Risk catalogue
D22 Relevant vulnerabilities
Risk catalogue
D27 Disregarded threats just.
Risk catalogue