AC-16
|
Security and Privacy Attributes
| Protects |
T1505
|
Server Software Component
|
AC-2
|
Account Management
| Protects |
T1505
|
Server Software Component
|
AC-3
|
Access Enforcement
| Protects |
T1505
|
Server Software Component
|
AC-5
|
Separation of Duties
| Protects |
T1505
|
Server Software Component
|
AC-6
|
Least Privilege
| Protects |
T1505
|
Server Software Component
|
CA-8
|
Penetration Testing
| Protects |
T1505
|
Server Software Component
|
CM-11
|
User-installed Software
| Protects |
T1505
|
Server Software Component
|
CM-2
|
Baseline Configuration
| Protects |
T1505
|
Server Software Component
|
CM-5
|
Access Restrictions for Change
| Protects |
T1505
|
Server Software Component
|
CM-6
|
Configuration Settings
| Protects |
T1505
|
Server Software Component
|
CM-8
|
System Component Inventory
| Protects |
T1505
|
Server Software Component
|
IA-2
|
Identification and Authentication (organizational Users)
| Protects |
T1505
|
Server Software Component
|
RA-5
|
Vulnerability Monitoring and Scanning
| Protects |
T1505
|
Server Software Component
|
SA-10
|
Developer Configuration Management
| Protects |
T1505
|
Server Software Component
|
SA-11
|
Developer Testing and Evaluation
| Protects |
T1505
|
Server Software Component
|
SC-16
|
Transmission of Security and Privacy Attributes
| Protects |
T1505
|
Server Software Component
|
SI-14
|
Non-persistence
| Protects |
T1505
|
Server Software Component
|
SI-4
|
System Monitoring
| Protects |
T1505
|
Server Software Component
|
SI-7
|
Software, Firmware, and Information Integrity
| Protects |
T1505
|
Server Software Component
|
SR-11
|
Component Authenticity
| Protects |
T1505
|
Server Software Component
|
SR-4
|
Provenance
| Protects |
T1505
|
Server Software Component
|
SR-5
|
Acquisition Strategies, Tools, and Methods
| Protects |
T1505
|
Server Software Component
|
SR-6
|
Supplier Assessments and Reviews
| Protects |
T1505
|
Server Software Component
|