Skip to main content

Security Documentation

Description

Security Documentation includes governance documentation, architecture documentation, operational procedures, and security guidelines related to the Scheol Lab environment.

This information asset represents the formal knowledge base used to document infrastructure design, security controls, and operational practices.


Asset Identification

AttributeValue
Asset IDDAT-DOC-01
CI TypeInformation
Asset NameSecurity Documentation
Asset CategoryGovernance & Technical Documentation
OwnerDevelopment Role (Dev)
StatusActive
LocationDocumentation Platform
Primary FunctionProvide structured documentation of architecture, governance, and security procedures

Asset Dependencies

Dependency TypeAssetStatus
PlatformDocumentation PlatformActive
InfrastructureDocumentation Platform ServerActive

Relationships

RelationshipTarget CI
Stored onDocumentation Platform
Supports capabilityGovernance & Documentation
Supports capabilitySecurity Monitoring & Detection
Supports capabilityInfrastructure Automation

Asset Classification

CriteriaLevel
Confidentiality🟨 Medium
Integrity🟥 High
Availability🟨 Medium

Criticality score: 🟥 High

Rationale:

  • Integrity is critical because inaccurate or tampered documentation may lead to misconfiguration or operational errors.
  • Availability is important for operational reference but not strictly required for infrastructure runtime.

Responsibilities

RoleResponsibility
Development Role (Dev)Creation and maintenance of documentation
Operations Role (Ops)Ensure documentation reflects infrastructure changes
Security Role (Sec)Review security architecture and control documentation

Security Controls (High-Level)

  • Access Control - restricted modification rights
  • Version Control - change tracking and documentation history
  • Backup & Recovery - protection against data loss
  • Integrity Protection - prevention of unauthorized modification

Security Considerations

Main risks associated with this asset include:

  • Unauthorized modification of documentation
  • Disclosure of sensitive infrastructure information
  • Loss or corruption of documentation data

Security measures may include:

  • Controlled editing permissions
  • Version-controlled documentation repository
  • Regular backups
  • Restricted access to sensitive architectural information

Methodological References:

  • ISO 27001 - Control 5.1 Policies for information security ; Control 5.37 Documented operating procedures ; Control 8.1 Information classification.
  • NIST CSF - ID.AM Asset Management.
  • EBIOS RM - Supporting asset identification.