@@ -398,6 +398,12 @@ The risk factors identified by the risk assessment in Annex C are grouped into r
-**[EXP-L-1]** NIS2 important entity
-**[EXP-L-2]** NIS2 critical entity
- Access to network used for communication between elements
-**[ACC-L-0]** Network physically isolated from public networks with strong physical access control procedures
-**[ACC-L-1]** Like L-0, but network has a single physical connection to public networks and strong internal segmentation and access controls that limit spread of compromise
-**[ACC-L-2]** Private network with multiple connections to public networks filtered by firewalls, no internal segmentation
-**[ACC-L-3]** Everything else
### 4.5.1 Mapping of use cases to risk factors and security profiles
The table below is an example, how the example use cases could be mapped to different risk factors.