Each rule has an assigned priority. Priorities are assigned using a metric based on Failure Mode, Effects, and Criticality Analysis (FMECA) [IEC 60812]. Three values are assigned for each rule on a scale of 1 to 3 for
...
- Likelihood - How likely is it that a flaw introduced by violating the rule could lead to an exploitable vulnerability:
1 = unlikely
2 = probable
3 = likely
...