AC-16
|
Security and Privacy Attributes
| Protects |
T1548
|
Abuse Elevation Control Mechanism
|
AC-2
|
Account Management
| Protects |
T1548
|
Abuse Elevation Control Mechanism
|
AC-3
|
Access Enforcement
| Protects |
T1548
|
Abuse Elevation Control Mechanism
|
AC-5
|
Separation of Duties
| Protects |
T1548
|
Abuse Elevation Control Mechanism
|
AC-6
|
Least Privilege
| Protects |
T1548
|
Abuse Elevation Control Mechanism
|
CA-7
|
Continuous Monitoring
| Protects |
T1548
|
Abuse Elevation Control Mechanism
|
CA-8
|
Penetration Testing
| Protects |
T1548
|
Abuse Elevation Control Mechanism
|
CM-2
|
Baseline Configuration
| Protects |
T1548
|
Abuse Elevation Control Mechanism
|
CM-5
|
Access Restrictions for Change
| Protects |
T1548
|
Abuse Elevation Control Mechanism
|
CM-6
|
Configuration Settings
| Protects |
T1548
|
Abuse Elevation Control Mechanism
|
CM-7
|
Least Functionality
| Protects |
T1548
|
Abuse Elevation Control Mechanism
|
CM-8
|
System Component Inventory
| Protects |
T1548
|
Abuse Elevation Control Mechanism
|
IA-2
|
Identification and Authentication (organizational Users)
| Protects |
T1548
|
Abuse Elevation Control Mechanism
|
RA-5
|
Vulnerability Monitoring and Scanning
| Protects |
T1548
|
Abuse Elevation Control Mechanism
|
SC-18
|
Mobile Code
| Protects |
T1548
|
Abuse Elevation Control Mechanism
|
SC-34
|
Non-modifiable Executable Programs
| Protects |
T1548
|
Abuse Elevation Control Mechanism
|
SI-12
|
Information Management and Retention
| Protects |
T1548
|
Abuse Elevation Control Mechanism
|
SI-16
|
Memory Protection
| Protects |
T1548
|
Abuse Elevation Control Mechanism
|
SI-3
|
Malicious Code Protection
| Protects |
T1548
|
Abuse Elevation Control Mechanism
|
SI-4
|
System Monitoring
| Protects |
T1548
|
Abuse Elevation Control Mechanism
|
SI-7
|
Software, Firmware, and Information Integrity
| Protects |
T1548
|
Abuse Elevation Control Mechanism
|