Data Port
Consider range of potential events DP
Identify events ERM
Description
Data Mapping
Mapping Source
Mapping Target
D21 Relevant threats
Potential events
D22 Relevant vulnerabilities
Potential events
D23 Relevant impacts
Potential events