| http://www.w3.org/ns/prov#value | - This approach shows how each control can help with multiple attack patterns and risks, increasing the leverage of each up-front or operational investment and helping to justify your security recommendations to the Board and other stakeholders.
|