Diagram:

Your browser does not support SVG files! We recommend you upgrade to the latest version of Firefox so you receive patterns with hyper-linked controls.

Legend: Any additional explanatory text needed to understand the pattern.

Description: Overview of the pattern. E.g. Secure desktop or laptop computers provided in a managed computing environment. Strategic intent of pattern e.g. support de-perimeterisation. Describe any additional architectural principles that may be reflected in the pattern.

Assumptions: Specific assumptions that have been made when writing the pattern that the target audience needs to appreciate.

Typical challenges: What can make the pattern hard to implement successfully, with possible mitigation strategies.

Indications: When should you apply this pattern. E.g. organisation with supported computing environment.

Contra-indications: When you should not use this pattern. E.g. Single user environment e.g. Home user.

Resistance against threats: List of the threats that the pattern can resist.

References: List of references e.g. URL's, publications that can give more information or have informed the approach.

Related patterns: Any other OSA patterns that are relevant

Classification: Module | Industry sector | Threat | Infrastructure area

Release: e.g. 08.02

Authors: Names

Reviewer(s): Names

Control details

AC-03 Access enforcement
AC-05 Separation Of Duties