AC-16
|
Security and Privacy Attributes
| Protects |
T1602
|
Data from Configuration Repository
|
AC-17
|
Remote Access
| Protects |
T1602
|
Data from Configuration Repository
|
AC-18
|
Wireless Access
| Protects |
T1602
|
Data from Configuration Repository
|
AC-19
|
Access Control for Mobile Devices
| Protects |
T1602
|
Data from Configuration Repository
|
AC-20
|
Use of External Systems
| Protects |
T1602
|
Data from Configuration Repository
|
AC-3
|
Access Enforcement
| Protects |
T1602
|
Data from Configuration Repository
|
AC-4
|
Information Flow Enforcement
| Protects |
T1602
|
Data from Configuration Repository
|
CA-7
|
Continuous Monitoring
| Protects |
T1602
|
Data from Configuration Repository
|
CM-2
|
Baseline Configuration
| Protects |
T1602
|
Data from Configuration Repository
|
CM-6
|
Configuration Settings
| Protects |
T1602
|
Data from Configuration Repository
|
CM-7
|
Least Functionality
| Protects |
T1602
|
Data from Configuration Repository
|
CM-8
|
System Component Inventory
| Protects |
T1602
|
Data from Configuration Repository
|
IA-3
|
Device Identification and Authentication
| Protects |
T1602
|
Data from Configuration Repository
|
IA-4
|
Identifier Management
| Protects |
T1602
|
Data from Configuration Repository
|
SC-28
|
Protection of Information at Rest
| Protects |
T1602
|
Data from Configuration Repository
|
SC-3
|
Security Function Isolation
| Protects |
T1602
|
Data from Configuration Repository
|
SC-4
|
Information in Shared System Resources
| Protects |
T1602
|
Data from Configuration Repository
|
SC-7
|
Boundary Protection
| Protects |
T1602
|
Data from Configuration Repository
|
SC-8
|
Transmission Confidentiality and Integrity
| Protects |
T1602
|
Data from Configuration Repository
|
SI-10
|
Information Input Validation
| Protects |
T1602
|
Data from Configuration Repository
|
SI-12
|
Information Management and Retention
| Protects |
T1602
|
Data from Configuration Repository
|
SI-15
|
Information Output Filtering
| Protects |
T1602
|
Data from Configuration Repository
|
SI-3
|
Malicious Code Protection
| Protects |
T1602
|
Data from Configuration Repository
|
SI-4
|
System Monitoring
| Protects |
T1602
|
Data from Configuration Repository
|
SI-7
|
Software, Firmware, and Information Integrity
| Protects |
T1602
|
Data from Configuration Repository
|