Last active
August 29, 2015 14:16
-
-
Save jacekd/3178578830a973bf8e28 to your computer and use it in GitHub Desktop.
d3.no.root.multiple.parents.html
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <!DOCTYPE html> | |
| <html> | |
| <head lang="en"> | |
| <meta charset="UTF-8"> | |
| <title>d3 three</title> | |
| <script src="https://cdnjs.cloudflare.com/ajax/libs/d3/3.5.5/d3.min.js"></script> | |
| <script src="https://cdnjs.cloudflare.com/ajax/libs/lodash.js/3.3.1/lodash.min.js"></script> | |
| <style> | |
| .link { | |
| stroke-width: 1px; | |
| stroke: #ddd; | |
| fill: none; | |
| } | |
| .text { | |
| font-family: "Lucida Grande", "Helvetica Nueue", Arial, sans-serif; | |
| font-size: 10px; | |
| } | |
| .hover { | |
| stroke: darkblue; | |
| } | |
| .cert-root { | |
| visibility: hidden; | |
| } | |
| .chart { | |
| width: 100%; | |
| height: 100%; | |
| } | |
| </style> | |
| </head> | |
| <body> | |
| <div class="chart"> | |
| </div> | |
| <script> | |
| var data = { | |
| name: "certificates", | |
| id: "cert-root", | |
| children: [ | |
| { | |
| name: "ISO", | |
| id: "cert-iso", | |
| children: [ | |
| {id:"CO-01",name:"co-AuditPlanning"}, | |
| {id:"CO-02",name:"co-IndependentAudits"}, | |
| {id:"CO-03",name:"co-ThirdPartyAudits"}, | |
| {id:"CO-04",name:"co-Contact"}, | |
| {id:"CO-05",name:"co-InformationSystemRegulatoryMapping"}, | |
| {id:"CO-06",name:"co-IntellectualProperty"}, | |
| {id:"DG-01",name:"DG-Ownership"}, | |
| {id:"DG-02",name:"DG-Classification"}, | |
| {id:"DG-03",name:"DG-Handling"}, | |
| {id:"DG-04",name:"DG-RetentionPolicy"}, | |
| {id:"DG-05",name:"DG-SecureDisposal"}, | |
| {id:"DG-06",name:"DG-NonProductionData"}, | |
| {id:"DG-07",name:"DG-InformationLeakage"}, | |
| {id:"DG-08",name:"DG-RiskAssessments"}, | |
| {id:"FS-01",name:"FS-Policy"}, | |
| {id:"FS-02",name:"FS-UserAccess"}, | |
| {id:"FS-03",name:"FS-ControlledAccessPoints"}, | |
| {id:"FS-04",name:"FS-SecureAreaAuthorization"}, | |
| {id:"FS-05",name:"FS-UnauthorizedPersonsEntry"}, | |
| {id:"FS-06",name:"FS-OffSiteAuthorization"}, | |
| {id:"FS-07",name:"FS-OffSiteEquipment"}, | |
| {id:"FS-08",name:"FS-AssetManagement"}, | |
| {id:"HR-01",name:"HRS-BackgroundScreening"}, | |
| {id:"HR-02",name:"HRS-EmploymentAgreements"}, | |
| {id:"HR-03",name:"HR-EmploymentTermination"}, | |
| {id:"IS-01",name:"IS-ManagementProgram"}, | |
| {id:"IS-02",name:"IS-ManagementSupport"}, | |
| {id:"IS-03",name:"IS-Policy"}, | |
| {id:"IS-04",name:"IS-BaselineRequirements"}, | |
| {id:"IS-05",name:"IS-PolicyReviews"}, | |
| {id:"IS-06",name:"IS-PolicyEnforcement"}, | |
| {id:"IS-07",name:"IS-UserAccessPolicy"}, | |
| {id:"IS-08",name:"IS-UserAccessRestriction"}, | |
| {id:"IS-09",name:"IS-UserAccessRevocation"}, | |
| {id:"IS-10",name:"IS-UserAccessReviews"}, | |
| {id:"IS-11",name:"IS-Training/Awareness"}, | |
| {id:"IS-12",name:"IS-IndustryKnowledge"}, | |
| {id:"IS-13",name:"IS-Roles"}, | |
| {id:"IS-14",name:"IS-ManagementOversight"}, | |
| {id:"IS-15",name:"IS-SegregationofDuties"}, | |
| {id:"IS-16",name:"IS-UserResponsibility"}, | |
| {id:"IS-17",name:"IS-Workspace"}, | |
| {id:"IS-18",name:"IS-Encryption"}, | |
| {id:"IS-19",name:"IS-EncryptionKeyManagement"}, | |
| {id:"IS-20",name:"IS-Vulnerability"}, | |
| {id:"IS-21",name:"IS-Anti-Virus"}, | |
| {id:"IS-22",name:"IS-IncidentManagement"}, | |
| {id:"IS-23",name:"IS-IncidentReporting"}, | |
| {id:"IS-24",name:"IS-IncidentResponseLegalPreparation"}, | |
| {id:"IS-25",name:"IS-IncidentResponseMetrics"}, | |
| {id:"IS-26",name:"IS-AcceptableUse"}, | |
| {id:"IS-27",name:"IS-AssetReturns"}, | |
| {id:"IS-28",name:"IS-eCommerceTransactions"}, | |
| {id:"IS-29",name:"IS-AuditToolsAccess"}, | |
| {id:"IS-30",name:"IS-Diagnostic"}, | |
| {id:"IS-31",name:"IS-Network"}, | |
| {id:"IS-32",name:"IS-Portable"}, | |
| {id:"IS-33",name:"IS-SourceCodeAccessRestriction"}, | |
| {id:"IS-34",name:"IS-UtilityProgramsAccess"}, | |
| {id:"LG-01",name:"L-Non-DisclosureAgreements"}, | |
| {id:"LG-02",name:"L-ThirdPartyAgreements"}, | |
| {id:"OP-01",name:"OM-Policy"}, | |
| {id:"OP-02",name:"OM-Documentation"}, | |
| {id:"OP-03",name:"OM-Capacity"}, | |
| {id:"OP-04",name:"OM-EquipmentMaintenance"}, | |
| {id:"RI-01",name:"RM-Program"}, | |
| {id:"RI-02",name:"RM-Assessments"}, | |
| {id:"RI-03",name:"RM-Mitigation"}, | |
| {id:"RI-04",name:"RM-Business"}, | |
| {id:"RI-05",name:"RM-ThirdPartyAccess"}, | |
| {id:"RM-01",name:"ReM-NewDevelopment"}, | |
| {id:"RM-02",name:"ReM-ProductionChanges"}, | |
| {id:"RM-03",name:"ReM-QualityTesting"}, | |
| {id:"RM-04",name:"ReM-OutsourcedDevelopment"}, | |
| {id:"RM-05",name:"ReM-UnauthorizedSoftwareInstallations"}, | |
| {id:"RS-01",name:"R-ManagementProgram"}, | |
| {id:"RS-02",name:"R-ImpactAnalysis"}, | |
| {id:"RS-03",name:"R-BusinessContinuityPlanning"}, | |
| {id:"RS-04",name:"R-BusinessContinuityTesting"}, | |
| {id:"RS-05",name:"R-EnvironmentalRisks"}, | |
| {id:"RS-06",name:"R-EquipmentLocation"}, | |
| {id:"RS-07",name:"R-EquipmentPowerFailures"}, | |
| {id:"RS-08",name:"R-Power"}, | |
| {id:"SA-01",name:"SA-CustomerAccessRequirements"}, | |
| {id:"SA-02",name:"SA-UserIDCredentials"}, | |
| {id:"SA-03",name:"SA-DataSecurity/Integrity"}, | |
| {id:"SA-04",name:"SA-ApplicationSecurity"}, | |
| {id:"SA-05",name:"SA-DataIntegrity"}, | |
| {id:"SA-06",name:"SA-Production"}, | |
| {id:"SA-07",name:"SA-RemoteUserMulti"}, | |
| {id:"SA-08",name:"SA-NetworkSecurity"}, | |
| {id:"SA-09",name:"SA-Segmentation"}, | |
| {id:"SA-10",name:"SA-WirelessSecurity"}, | |
| {id:"SA-11",name:"SA-SharedNetworks"}, | |
| {id:"SA-12",name:"SA-ClockSynchronization"}, | |
| {id:"SA-13",name:"SA-EquipmentIdentification"}, | |
| {id:"SA-14",name:"SA-AuditLogging/IntrusionDetection"}, | |
| {id:"SA-15",name:"SA-MobileCode"} | |
| ] | |
| }, | |
| { | |
| name: "PCI", | |
| id: "cert-pci", | |
| children: [ | |
| {id:"CO-01",name:"co-AuditPlanning"}, | |
| {id:"CO-02",name:"co-IndependentAudits"}, | |
| {id:"CO-03",name:"co-ThirdPartyAudits"}, | |
| {id:"CO-04",name:"co-Contact"}, | |
| {id:"CO-05",name:"co-InformationSystemRegulatoryMapping"}, | |
| {id:"DG-02",name:"DG-Classification"}, | |
| {id:"DG-03",name:"DG-Handling"}, | |
| {id:"DG-04",name:"DG-RetentionPolicy"}, | |
| {id:"DG-05",name:"DG-SecureDisposal"}, | |
| {id:"DG-06",name:"DG-NonProductionData"}, | |
| {id:"DG-07",name:"DG-InformationLeakage"}, | |
| {id:"DG-08",name:"DG-RiskAssessments"}, | |
| {id:"FS-01",name:"FS-Policy"}, | |
| {id:"FS-02",name:"FS-UserAccess"}, | |
| {id:"FS-03",name:"FS-ControlledAccessPoints"}, | |
| {id:"FS-04",name:"FS-SecureAreaAuthorization"}, | |
| {id:"FS-06",name:"FS-OffSiteAuthorization"}, | |
| {id:"FS-07",name:"FS-OffSiteEquipment"}, | |
| {id:"FS-08",name:"FS-AssetManagement"}, | |
| {id:"HR-01",name:"HRS-BackgroundScreening"}, | |
| {id:"HR-02",name:"HRS-EmploymentAgreements"}, | |
| {id:"IS-01",name:"IS-ManagementProgram"}, | |
| {id:"IS-02",name:"IS-ManagementSupport"}, | |
| {id:"IS-03",name:"IS-Policy"}, | |
| {id:"IS-04",name:"IS-BaselineRequirements"}, | |
| {id:"IS-05",name:"IS-PolicyReviews"}, | |
| {id:"IS-07",name:"IS-UserAccessPolicy"}, | |
| {id:"IS-08",name:"IS-UserAccessRestriction"}, | |
| {id:"IS-09",name:"IS-UserAccessRevocation"}, | |
| {id:"IS-11",name:"IS-Training/Awareness"}, | |
| {id:"IS-14",name:"IS-ManagementOversight"}, | |
| {id:"IS-15",name:"IS-SegregationofDuties"}, | |
| {id:"IS-16",name:"IS-UserResponsibility"}, | |
| {id:"IS-18",name:"IS-Encryption"}, | |
| {id:"IS-19",name:"IS-EncryptionKeyManagement"}, | |
| {id:"IS-20",name:"IS-Vulnerability"}, | |
| {id:"IS-21",name:"IS-Anti-Virus"}, | |
| {id:"IS-22",name:"IS-IncidentManagement"}, | |
| {id:"IS-23",name:"IS-IncidentReporting"}, | |
| {id:"IS-25",name:"IS-IncidentResponseMetrics"}, | |
| {id:"IS-26",name:"IS-AcceptableUse"}, | |
| {id:"IS-28",name:"IS-eCommerceTransactions"}, | |
| {id:"IS-30",name:"IS-Diagnostic"}, | |
| {id:"IS-32",name:"IS-Portable"}, | |
| {id:"IS-33",name:"IS-SourceCodeAccessRestriction"}, | |
| {id:"IS-34",name:"IS-UtilityProgramsAccess"}, | |
| {id:"LG-01",name:"L-Non-DisclosureAgreements"}, | |
| {id:"LG-02",name:"L-ThirdPartyAgreements"}, | |
| {id:"OP-01",name:"OM-Policy"}, | |
| {id:"OP-02",name:"OM-Documentation"}, | |
| {id:"RI-01",name:"RM-Program"}, | |
| {id:"RI-02",name:"RM-Assessments"}, | |
| {id:"RI-04",name:"RM-Business"}, | |
| {id:"RI-05",name:"RM-ThirdPartyAccess"}, | |
| {id:"RM-01",name:"ReM-NewDevelopment"}, | |
| {id:"RM-02",name:"ReM-ProductionChanges"}, | |
| {id:"RM-03",name:"ReM-QualityTesting"}, | |
| {id:"RM-04",name:"ReM-OutsourcedDevelopment"}, | |
| {id:"RS-01",name:"R-ManagementProgram"}, | |
| {id:"RS-03",name:"R-BusinessContinuityPlanning"}, | |
| {id:"RS-04",name:"R-BusinessContinuityTesting"}, | |
| {id:"RS-06",name:"R-EquipmentLocation"}, | |
| {id:"SA-02",name:"SA-UserIDCredentials"}, | |
| {id:"SA-03",name:"SA-DataSecurity/Integrity"}, | |
| {id:"SA-04",name:"SA-ApplicationSecurity"}, | |
| {id:"SA-05",name:"SA-DataIntegrity"}, | |
| {id:"SA-06",name:"SA-Production"}, | |
| {id:"SA-07",name:"SA-RemoteUserMulti"}, | |
| {id:"SA-08",name:"SA-NetworkSecurity"}, | |
| {id:"SA-09",name:"SA-Segmentation"}, | |
| {id:"SA-10",name:"SA-WirelessSecurity"}, | |
| {id:"SA-11",name:"SA-SharedNetworks"}, | |
| {id:"SA-12",name:"SA-ClockSynchronization"}, | |
| {id:"SA-14",name:"SA-AuditLogging/IntrusionDetection"} | |
| ] | |
| }, | |
| { | |
| name: "HIPPA", | |
| id: "cert-hippa", | |
| children: [ | |
| {id:"CO-01",name:"co-AuditPlanning"}, | |
| {id:"CO-02",name:"co-IndependentAudits"}, | |
| {id:"CO-03",name:"co-ThirdPartyAudits"}, | |
| {id:"DG-01",name:"DG-Ownership"}, | |
| {id:"DG-04",name:"DG-RetentionPolicy"}, | |
| {id:"DG-05",name:"DG-SecureDisposal"}, | |
| {id:"DG-06",name:"DG-NonProductionData"}, | |
| {id:"DG-08",name:"DG-RiskAssessments"}, | |
| {id:"FS-01",name:"FS-Policy"}, | |
| {id:"FS-02",name:"FS-UserAccess"}, | |
| {id:"FS-06",name:"FS-OffSiteAuthorization"}, | |
| {id:"FS-07",name:"FS-OffSiteEquipment"}, | |
| {id:"FS-08",name:"FS-AssetManagement"}, | |
| {id:"HR-02",name:"HRS-EmploymentAgreements"}, | |
| {id:"HR-03",name:"HR-EmploymentTermination"}, | |
| {id:"IS-01",name:"IS-ManagementProgram"}, | |
| {id:"IS-02",name:"IS-ManagementSupport"}, | |
| {id:"IS-03",name:"IS-Policy"}, | |
| {id:"IS-05",name:"IS-PolicyReviews"}, | |
| {id:"IS-06",name:"IS-PolicyEnforcement"}, | |
| {id:"IS-07",name:"IS-UserAccessPolicy"}, | |
| {id:"IS-08",name:"IS-UserAccessRestriction"}, | |
| {id:"IS-09",name:"IS-UserAccessRevocation"}, | |
| {id:"IS-10",name:"IS-UserAccessReviews"}, | |
| {id:"IS-11",name:"IS-Training/Awareness"}, | |
| {id:"IS-15",name:"IS-SegregationofDuties"}, | |
| {id:"IS-16",name:"IS-UserResponsibility"}, | |
| {id:"IS-18",name:"IS-Encryption"}, | |
| {id:"IS-19",name:"IS-EncryptionKeyManagement"}, | |
| {id:"IS-20",name:"IS-Vulnerability"}, | |
| {id:"IS-21",name:"IS-Anti-Virus"}, | |
| {id:"IS-22",name:"IS-IncidentManagement"}, | |
| {id:"IS-23",name:"IS-IncidentReporting"}, | |
| {id:"IS-24",name:"IS-IncidentResponseLegalPreparation"}, | |
| {id:"IS-25",name:"IS-IncidentResponseMetrics"}, | |
| {id:"IS-26",name:"IS-AcceptableUse"}, | |
| {id:"IS-27",name:"IS-AssetReturns"}, | |
| {id:"IS-28",name:"IS-eCommerceTransactions"}, | |
| {id:"IS-32",name:"IS-Portable"}, | |
| {id:"LG-02",name:"L-ThirdPartyAgreements"}, | |
| {id:"OP-04",name:"OM-EquipmentMaintenance"}, | |
| {id:"RI-01",name:"RM-Program"}, | |
| {id:"RI-02",name:"RM-Assessments"}, | |
| {id:"RI-03",name:"RM-Mitigation"}, | |
| {id:"RM-02",name:"ReM-ProductionChanges"}, | |
| {id:"RS-01",name:"R-ManagementProgram"}, | |
| {id:"RS-02",name:"R-ImpactAnalysis"}, | |
| {id:"RS-03",name:"R-BusinessContinuityPlanning"}, | |
| {id:"RS-04",name:"R-BusinessContinuityTesting"}, | |
| {id:"RS-05",name:"R-EnvironmentalRisks"}, | |
| {id:"RS-06",name:"R-EquipmentLocation"}, | |
| {id:"SA-02",name:"SA-UserIDCredentials"}, | |
| {id:"SA-04",name:"SA-ApplicationSecurity"}, | |
| {id:"SA-05",name:"SA-DataIntegrity"}, | |
| {id:"SA-09",name:"SA-Segmentation"}, | |
| {id:"SA-10",name:"SA-WirelessSecurity"}, | |
| {id:"SA-11",name:"SA-SharedNetworks"}, | |
| {id:"SA-14",name:"SA-AuditLogging/IntrusionDetection"} | |
| ] | |
| }, | |
| { | |
| name: "GAPP", | |
| id: "cert-gapp", | |
| children: [ | |
| {id:"CO-01",name:"co-AuditPlanning"}, | |
| {id:"CO-02",name:"co-IndependentAudits"}, | |
| {id:"CO-03",name:"co-ThirdPartyAudits"}, | |
| {id:"CO-04",name:"co-Contact"}, | |
| {id:"CO-05",name:"co-InformationSystemRegulatoryMapping"}, | |
| {id:"DG-01",name:"DG-Ownership"}, | |
| {id:"DG-02",name:"DG-Classification"}, | |
| {id:"DG-03",name:"DG-Handling"}, | |
| {id:"DG-04",name:"DG-RetentionPolicy"}, | |
| {id:"DG-05",name:"DG-SecureDisposal"}, | |
| {id:"DG-06",name:"DG-NonProductionData"}, | |
| {id:"DG-07",name:"DG-InformationLeakage"}, | |
| {id:"DG-08",name:"DG-RiskAssessments"}, | |
| {id:"FS-01",name:"FS-Policy"}, | |
| {id:"FS-02",name:"FS-UserAccess"}, | |
| {id:"FS-03",name:"FS-ControlledAccessPoints"}, | |
| {id:"FS-04",name:"FS-SecureAreaAuthorization"}, | |
| {id:"FS-05",name:"FS-UnauthorizedPersonsEntry"}, | |
| {id:"FS-06",name:"FS-OffSiteAuthorization"}, | |
| {id:"HR-01",name:"HRS-BackgroundScreening"}, | |
| {id:"HR-02",name:"HRS-EmploymentAgreements"}, | |
| {id:"HR-03",name:"HR-EmploymentTermination"}, | |
| {id:"IS-01",name:"IS-ManagementProgram"}, | |
| {id:"IS-02",name:"IS-ManagementSupport"}, | |
| {id:"IS-03",name:"IS-Policy"}, | |
| {id:"IS-04",name:"IS-BaselineRequirements"}, | |
| {id:"IS-05",name:"IS-PolicyReviews"}, | |
| {id:"IS-06",name:"IS-PolicyEnforcement"}, | |
| {id:"IS-07",name:"IS-UserAccessPolicy"}, | |
| {id:"IS-08",name:"IS-UserAccessRestriction"}, | |
| {id:"IS-09",name:"IS-UserAccessRevocation"}, | |
| {id:"IS-10",name:"IS-UserAccessReviews"}, | |
| {id:"IS-11",name:"IS-Training/Awareness"}, | |
| {id:"IS-13",name:"IS-Roles"}, | |
| {id:"IS-14",name:"IS-ManagementOversight"}, | |
| {id:"IS-15",name:"IS-SegregationofDuties"}, | |
| {id:"IS-16",name:"IS-UserResponsibility"}, | |
| {id:"IS-17",name:"IS-Workspace"}, | |
| {id:"IS-18",name:"IS-Encryption"}, | |
| {id:"IS-19",name:"IS-EncryptionKeyManagement"}, | |
| {id:"IS-20",name:"IS-Vulnerability"}, | |
| {id:"IS-21",name:"IS-Anti-Virus"}, | |
| {id:"IS-22",name:"IS-IncidentManagement"}, | |
| {id:"IS-23",name:"IS-IncidentReporting"}, | |
| {id:"IS-24",name:"IS-IncidentResponseLegalPreparation"}, | |
| {id:"IS-25",name:"IS-IncidentResponseMetrics"}, | |
| {id:"IS-26",name:"IS-AcceptableUse"}, | |
| {id:"IS-27",name:"IS-AssetReturns"}, | |
| {id:"IS-28",name:"IS-eCommerceTransactions"}, | |
| {id:"IS-29",name:"IS-AuditToolsAccess"}, | |
| {id:"IS-31",name:"IS-Network"}, | |
| {id:"IS-32",name:"IS-Portable"}, | |
| {id:"IS-33",name:"IS-SourceCodeAccessRestriction"}, | |
| {id:"LG-01",name:"L-Non-DisclosureAgreements"}, | |
| {id:"LG-02",name:"L-ThirdPartyAgreements"}, | |
| {id:"OP-01",name:"OM-Policy"}, | |
| {id:"OP-02",name:"OM-Documentation"}, | |
| {id:"OP-03",name:"OM-Capacity"}, | |
| {id:"OP-04",name:"OM-EquipmentMaintenance"}, | |
| {id:"RI-01",name:"RM-Program"}, | |
| {id:"RI-02",name:"RM-Assessments"}, | |
| {id:"RI-05",name:"RM-ThirdPartyAccess"}, | |
| {id:"RM-01",name:"ReM-NewDevelopment"}, | |
| {id:"RM-02",name:"ReM-ProductionChanges"}, | |
| {id:"RM-03",name:"ReM-QualityTesting"}, | |
| {id:"RM-05",name:"ReM-UnauthorizedSoftwareInstallations"}, | |
| {id:"RS-05",name:"R-EnvironmentalRisks"}, | |
| {id:"SA-01",name:"SA-CustomerAccessRequirements"}, | |
| {id:"SA-03",name:"SA-DataSecurity/Integrity"}, | |
| {id:"SA-04",name:"SA-ApplicationSecurity"}, | |
| {id:"SA-05",name:"SA-DataIntegrity"}, | |
| {id:"SA-06",name:"SA-Production"}, | |
| {id:"SA-07",name:"SA-RemoteUserMulti"}, | |
| {id:"SA-08",name:"SA-NetworkSecurity"}, | |
| {id:"SA-10",name:"SA-WirelessSecurity"}, | |
| {id:"SA-11",name:"SA-SharedNetworks"}, | |
| {id:"SA-14",name:"SA-AuditLogging/IntrusionDetection"} | |
| ] | |
| }, | |
| { | |
| name: "NIST", | |
| id: "cert-nist", | |
| children: [ | |
| {id:"CO-01",name:"co-AuditPlanning"}, | |
| {id:"CO-02",name:"co-IndependentAudits"}, | |
| {id:"CO-03",name:"co-ThirdPartyAudits"}, | |
| {id:"CO-04",name:"co-Contact"}, | |
| {id:"CO-05",name:"co-InformationSystemRegulatoryMapping"}, | |
| {id:"CO-06",name:"co-IntellectualProperty"}, | |
| {id:"DG-01",name:"DG-Ownership"}, | |
| {id:"DG-02",name:"DG-Classification"}, | |
| {id:"DG-03",name:"DG-Handling"}, | |
| {id:"DG-04",name:"DG-RetentionPolicy"}, | |
| {id:"DG-05",name:"DG-SecureDisposal"}, | |
| {id:"DG-06",name:"DG-NonProductionData"}, | |
| {id:"DG-07",name:"DG-InformationLeakage"}, | |
| {id:"DG-08",name:"DG-RiskAssessments"}, | |
| {id:"FS-01",name:"FS-Policy"}, | |
| {id:"FS-02",name:"FS-UserAccess"}, | |
| {id:"FS-03",name:"FS-ControlledAccessPoints"}, | |
| {id:"FS-04",name:"FS-SecureAreaAuthorization"}, | |
| {id:"FS-05",name:"FS-UnauthorizedPersonsEntry"}, | |
| {id:"FS-06",name:"FS-OffSiteAuthorization"}, | |
| {id:"FS-07",name:"FS-OffSiteEquipment"}, | |
| {id:"FS-08",name:"FS-AssetManagement"}, | |
| {id:"HR-01",name:"HRS-BackgroundScreening"}, | |
| {id:"HR-02",name:"HRS-EmploymentAgreements"}, | |
| {id:"HR-03",name:"HR-EmploymentTermination"}, | |
| {id:"IS-01",name:"IS-ManagementProgram"}, | |
| {id:"IS-02",name:"IS-ManagementSupport"}, | |
| {id:"IS-03",name:"IS-Policy"}, | |
| {id:"IS-04",name:"IS-BaselineRequirements"}, | |
| {id:"IS-05",name:"IS-PolicyReviews"}, | |
| {id:"IS-06",name:"IS-PolicyEnforcement"}, | |
| {id:"IS-07",name:"IS-UserAccessPolicy"}, | |
| {id:"IS-08",name:"IS-UserAccessRestriction"}, | |
| {id:"IS-09",name:"IS-UserAccessRevocation"}, | |
| {id:"IS-10",name:"IS-UserAccessReviews"}, | |
| {id:"IS-11",name:"IS-Training/Awareness"}, | |
| {id:"IS-12",name:"IS-IndustryKnowledge"}, | |
| {id:"IS-13",name:"IS-Roles"}, | |
| {id:"IS-14",name:"IS-ManagementOversight"}, | |
| {id:"IS-15",name:"IS-SegregationofDuties"}, | |
| {id:"IS-16",name:"IS-UserResponsibility"}, | |
| {id:"IS-17",name:"IS-Workspace"}, | |
| {id:"IS-18",name:"IS-Encryption"}, | |
| {id:"IS-19",name:"IS-EncryptionKeyManagement"}, | |
| {id:"IS-20",name:"IS-Vulnerability"}, | |
| {id:"IS-21",name:"IS-Anti-Virus"}, | |
| {id:"IS-22",name:"IS-IncidentManagement"}, | |
| {id:"IS-23",name:"IS-IncidentReporting"}, | |
| {id:"IS-24",name:"IS-IncidentResponseLegalPreparation"}, | |
| {id:"IS-25",name:"IS-IncidentResponseMetrics"}, | |
| {id:"IS-26",name:"IS-AcceptableUse"}, | |
| {id:"IS-27",name:"IS-AssetReturns"}, | |
| {id:"IS-28",name:"IS-eCommerceTransactions"}, | |
| {id:"IS-29",name:"IS-AuditToolsAccess"}, | |
| {id:"IS-30",name:"IS-Diagnostic"}, | |
| {id:"IS-31",name:"IS-Network"}, | |
| {id:"IS-32",name:"IS-Portable"}, | |
| {id:"IS-33",name:"IS-SourceCodeAccessRestriction"}, | |
| {id:"IS-34",name:"IS-UtilityProgramsAccess"}, | |
| {id:"LG-01",name:"L-Non-DisclosureAgreements"}, | |
| {id:"LG-02",name:"L-ThirdPartyAgreements"}, | |
| {id:"OP-01",name:"OM-Policy"}, | |
| {id:"OP-02",name:"OM-Documentation"}, | |
| {id:"OP-03",name:"OM-Capacity"}, | |
| {id:"OP-04",name:"OM-EquipmentMaintenance"}, | |
| {id:"RI-01",name:"RM-Program"}, | |
| {id:"RI-02",name:"RM-Assessments"}, | |
| {id:"RI-03",name:"RM-Mitigation"}, | |
| {id:"RI-04",name:"RM-Business"}, | |
| {id:"RI-05",name:"RM-ThirdPartyAccess"}, | |
| {id:"RM-01",name:"ReM-NewDevelopment"}, | |
| {id:"RM-02",name:"ReM-ProductionChanges"}, | |
| {id:"RM-03",name:"ReM-QualityTesting"}, | |
| {id:"RM-04",name:"ReM-OutsourcedDevelopment"}, | |
| {id:"RM-05",name:"ReM-UnauthorizedSoftwareInstallations"}, | |
| {id:"RS-01",name:"R-ManagementProgram"}, | |
| {id:"RS-02",name:"R-ImpactAnalysis"}, | |
| {id:"RS-03",name:"R-BusinessContinuityPlanning"}, | |
| {id:"RS-04",name:"R-BusinessContinuityTesting"}, | |
| {id:"RS-05",name:"R-EnvironmentalRisks"}, | |
| {id:"RS-06",name:"R-EquipmentLocation"}, | |
| {id:"RS-07",name:"R-EquipmentPowerFailures"}, | |
| {id:"RS-08",name:"R-Power"}, | |
| {id:"SA-01",name:"SA-CustomerAccessRequirements"}, | |
| {id:"SA-02",name:"SA-UserIDCredentials"}, | |
| {id:"SA-03",name:"SA-DataSecurity/Integrity"}, | |
| {id:"SA-04",name:"SA-ApplicationSecurity"}, | |
| {id:"SA-05",name:"SA-DataIntegrity"}, | |
| {id:"SA-06",name:"SA-Production"}, | |
| {id:"SA-07",name:"SA-RemoteUserMulti"}, | |
| {id:"SA-08",name:"SA-NetworkSecurity"}, | |
| {id:"SA-09",name:"SA-Segmentation"}, | |
| {id:"SA-10",name:"SA-WirelessSecurity"}, | |
| {id:"SA-11",name:"SA-SharedNetworks"}, | |
| {id:"SA-12",name:"SA-ClockSynchronization"}, | |
| {id:"SA-13",name:"SA-EquipmentIdentification"}, | |
| {id:"SA-14",name:"SA-AuditLogging/IntrusionDetection"}, | |
| {id:"SA-15",name:"SA-MobileCode"} | |
| ] | |
| }, | |
| { | |
| name: "COBIT", | |
| id: "cert-cobit", | |
| children: [ | |
| {id:"CO-01",name:"co-AuditPlanning"}, | |
| {id:"CO-02",name:"co-IndependentAudits"}, | |
| {id:"CO-03",name:"co-ThirdPartyAudits"}, | |
| {id:"CO-04",name:"co-Contact"}, | |
| {id:"CO-05",name:"co-InformationSystemRegulatoryMapping"}, | |
| {id:"DG-01",name:"DG-Ownership"}, | |
| {id:"DG-02",name:"DG-Classification"}, | |
| {id:"DG-03",name:"DG-Handling"}, | |
| {id:"DG-04",name:"DG-RetentionPolicy"}, | |
| {id:"DG-05",name:"DG-SecureDisposal"}, | |
| {id:"DG-07",name:"DG-InformationLeakage"}, | |
| {id:"DG-08",name:"DG-RiskAssessments"}, | |
| {id:"FS-01",name:"FS-Policy"}, | |
| {id:"FS-03",name:"FS-ControlledAccessPoints"}, | |
| {id:"FS-04",name:"FS-SecureAreaAuthorization"}, | |
| {id:"FS-05",name:"FS-UnauthorizedPersonsEntry"}, | |
| {id:"HR-01",name:"HRS-BackgroundScreening"}, | |
| {id:"HR-02",name:"HRS-EmploymentAgreements"}, | |
| {id:"HR-03",name:"HR-EmploymentTermination"}, | |
| {id:"IS-01",name:"IS-ManagementProgram"}, | |
| {id:"IS-02",name:"IS-ManagementSupport"}, | |
| {id:"IS-03",name:"IS-Policy"}, | |
| {id:"IS-04",name:"IS-BaselineRequirements"}, | |
| {id:"IS-05",name:"IS-PolicyReviews"}, | |
| {id:"IS-06",name:"IS-PolicyEnforcement"}, | |
| {id:"IS-07",name:"IS-UserAccessPolicy"}, | |
| {id:"IS-08",name:"IS-UserAccessRestriction"}, | |
| {id:"IS-09",name:"IS-UserAccessRevocation"}, | |
| {id:"IS-10",name:"IS-UserAccessReviews"}, | |
| {id:"IS-11",name:"IS-Training/Awareness"}, | |
| {id:"IS-13",name:"IS-Roles"}, | |
| {id:"IS-14",name:"IS-ManagementOversight"}, | |
| {id:"IS-15",name:"IS-SegregationofDuties"}, | |
| {id:"IS-16",name:"IS-UserResponsibility"}, | |
| {id:"IS-18",name:"IS-Encryption"}, | |
| {id:"IS-19",name:"IS-EncryptionKeyManagement"}, | |
| {id:"IS-20",name:"IS-Vulnerability"}, | |
| {id:"IS-21",name:"IS-Anti-Virus"}, | |
| {id:"IS-22",name:"IS-IncidentManagement"}, | |
| {id:"IS-23",name:"IS-IncidentReporting"}, | |
| {id:"IS-24",name:"IS-IncidentResponseLegalPreparation"}, | |
| {id:"IS-25",name:"IS-IncidentResponseMetrics"}, | |
| {id:"IS-26",name:"IS-AcceptableUse"}, | |
| {id:"IS-27",name:"IS-AssetReturns"}, | |
| {id:"IS-28",name:"IS-eCommerceTransactions"}, | |
| {id:"IS-29",name:"IS-AuditToolsAccess"}, | |
| {id:"IS-30",name:"IS-Diagnostic"}, | |
| {id:"IS-31",name:"IS-Network"}, | |
| {id:"IS-32",name:"IS-Portable"}, | |
| {id:"IS-34",name:"IS-UtilityProgramsAccess"}, | |
| {id:"LG-01",name:"L-Non-DisclosureAgreements"}, | |
| {id:"LG-02",name:"L-ThirdPartyAgreements"}, | |
| {id:"OP-01",name:"OM-Policy"}, | |
| {id:"OP-02",name:"OM-Documentation"}, | |
| {id:"OP-03",name:"OM-Capacity"}, | |
| {id:"OP-04",name:"OM-EquipmentMaintenance"}, | |
| {id:"RI-01",name:"RM-Program"}, | |
| {id:"RI-02",name:"RM-Assessments"}, | |
| {id:"RI-03",name:"RM-Mitigation"}, | |
| {id:"RI-04",name:"RM-Business"}, | |
| {id:"RI-05",name:"RM-ThirdPartyAccess"}, | |
| {id:"RM-01",name:"ReM-NewDevelopment"}, | |
| {id:"RM-02",name:"ReM-ProductionChanges"}, | |
| {id:"RM-03",name:"ReM-QualityTesting"}, | |
| {id:"RS-01",name:"R-ManagementProgram"}, | |
| {id:"SA-02",name:"SA-UserIDCredentials"}, | |
| {id:"SA-03",name:"SA-DataSecurity/Integrity"}, | |
| {id:"SA-04",name:"SA-ApplicationSecurity"}, | |
| {id:"SA-06",name:"SA-Production"}, | |
| {id:"SA-09",name:"SA-Segmentation"}, | |
| {id:"SA-10",name:"SA-WirelessSecurity"}, | |
| {id:"SA-12",name:"SA-ClockSynchronization"}, | |
| {id:"SA-13",name:"SA-EquipmentIdentification"}, | |
| {id:"SA-14",name:"SA-AuditLogging/IntrusionDetection"} | |
| ] | |
| } | |
| ] | |
| }; | |
| var graph = { | |
| width: 1000, | |
| height: 900 | |
| }; | |
| d3.selection.prototype.moveToFront = function() { | |
| return this.each(function(){ | |
| this.parentNode.appendChild(this); | |
| }); | |
| }; | |
| var svg = d3.select('.chart').append('svg:svg') | |
| .attr("width", graph.width) | |
| .attr("height", graph.height) | |
| .append('svg:g') | |
| .attr('transform', 'translate(-' + graph.width * 0.2 + ', 0)'); | |
| function elbow(d, i) { | |
| return "M" + d.source.y + "," + d.source.x + "H" + d.target.y | |
| + "V" + d.target.x + "H" + d.target.y | |
| } | |
| var diagonal = d3.svg.diagonal() | |
| .projection(function(d) | |
| { | |
| return [d.y, d.x]; | |
| }); | |
| var tree = d3.layout.tree() | |
| .size([graph.height,graph.width/2]); | |
| var nodes = tree.nodes(data); | |
| nodes = _.uniq(nodes, 'id'); | |
| _.each(nodes, function (o , i) { | |
| var itemsOfTheSameDepth = _.where(nodes, {depth: o.depth}); | |
| var indexOfCurrent = _.indexOf(itemsOfTheSameDepth, o); | |
| var interval = graph.height / itemsOfTheSameDepth.length; | |
| nodes[i].x = interval / 2 + (interval * indexOfCurrent); | |
| }); | |
| var links = tree.links(nodes); | |
| _.each(links, function (o, i) { | |
| links[i].target = _.find(nodes, {id: o.target.id}); | |
| }); | |
| var link = svg.selectAll("path") | |
| .data(links) | |
| .enter().append("svg:path") | |
| .attr('class', function (d) { | |
| return (!!d.source) ? d.source.id : "root"; | |
| }) | |
| .classed('link', true) | |
| .attr('d', diagonal); | |
| var node = svg.selectAll('g.node') | |
| .data(nodes) | |
| .enter().append("svg:g") | |
| .attr("transform", function (d) { | |
| return "translate(" + d.y + "," + d.x + ")"; | |
| }) | |
| .on('mouseover', function (d) { | |
| d3.selectAll("." + d.id) | |
| .classed("hover", true) | |
| .moveToFront(); | |
| }) | |
| .on('mouseout', function (d) { | |
| d3.selectAll('.' + d.id) | |
| .classed('hover', false); | |
| }); | |
| var colors = d3.scale.category20(); | |
| node.append("svg:circle") | |
| .attr("r", 3) | |
| .attr('fill', function (d, i) { | |
| return colors(i); | |
| }); | |
| node.append("svg:text") | |
| .attr("dx", function (d) { | |
| return d.children ? -8: 8; | |
| }) | |
| .attr("dy", 3) | |
| .classed("text", true) | |
| .attr("text-anchor", function (d) { | |
| return d.children ? "end" : "start"; | |
| }) | |
| .text(function (d) { | |
| return d.name; | |
| }); | |
| </script> | |
| </body> | |
| </html> |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment