|
AC-16
|
Security and Privacy Attributes
| Protects |
T1070.002
|
Clear Linux or Mac System Logs
|
|
AC-17
|
Remote Access
| Protects |
T1070.002
|
Clear Linux or Mac System Logs
|
|
AC-18
|
Wireless Access
| Protects |
T1070.002
|
Clear Linux or Mac System Logs
|
|
AC-19
|
Access Control for Mobile Devices
| Protects |
T1070.002
|
Clear Linux or Mac System Logs
|
|
AC-2
|
Account Management
| Protects |
T1070.002
|
Clear Linux or Mac System Logs
|
|
AC-3
|
Access Enforcement
| Protects |
T1070.002
|
Clear Linux or Mac System Logs
|
|
AC-5
|
Separation of Duties
| Protects |
T1070.002
|
Clear Linux or Mac System Logs
|
|
AC-6
|
Least Privilege
| Protects |
T1070.002
|
Clear Linux or Mac System Logs
|
|
CA-7
|
Continuous Monitoring
| Protects |
T1070.002
|
Clear Linux or Mac System Logs
|
|
CM-2
|
Baseline Configuration
| Protects |
T1070.002
|
Clear Linux or Mac System Logs
|
|
CM-6
|
Configuration Settings
| Protects |
T1070.002
|
Clear Linux or Mac System Logs
|
|
CP-6
|
Alternate Storage Site
| Protects |
T1070.002
|
Clear Linux or Mac System Logs
|
|
CP-7
|
Alternate Processing Site
| Protects |
T1070.002
|
Clear Linux or Mac System Logs
|
|
CP-9
|
System Backup
| Protects |
T1070.002
|
Clear Linux or Mac System Logs
|
|
SC-36
|
Distributed Processing and Storage
| Protects |
T1070.002
|
Clear Linux or Mac System Logs
|
|
SC-4
|
Information in Shared System Resources
| Protects |
T1070.002
|
Clear Linux or Mac System Logs
|
|
SI-12
|
Information Management and Retention
| Protects |
T1070.002
|
Clear Linux or Mac System Logs
|
|
SI-23
|
Information Fragmentation
| Protects |
T1070.002
|
Clear Linux or Mac System Logs
|
|
SI-3
|
Malicious Code Protection
| Protects |
T1070.002
|
Clear Linux or Mac System Logs
|
|
SI-4
|
System Monitoring
| Protects |
T1070.002
|
Clear Linux or Mac System Logs
|
|
SI-7
|
Software, Firmware, and Information Integrity
| Protects |
T1070.002
|
Clear Linux or Mac System Logs
|