Instructions to use:
For any system under consideration, check what is existing in your environment and start selecting those controls from both columns sequentially (Left > Right> Left)
Once you select exact controls, for specific FR, it will show you a Security Level of SuC
This SL could be SL-Capability/Target/Achieved, depending on your use case.