AC-16 |
Security and Privacy Attributes |
Protects |
T1052 |
Exfiltration Over Physical Medium |
AC-2 |
Account Management |
Protects |
T1052 |
Exfiltration Over Physical Medium |
AC-20 |
Use of External Systems |
Protects |
T1052 |
Exfiltration Over Physical Medium |
AC-23 |
Data Mining Protection |
Protects |
T1052 |
Exfiltration Over Physical Medium |
AC-3 |
Access Enforcement |
Protects |
T1052 |
Exfiltration Over Physical Medium |
AC-6 |
Least Privilege |
Protects |
T1052 |
Exfiltration Over Physical Medium |
CA-7 |
Continuous Monitoring |
Protects |
T1052 |
Exfiltration Over Physical Medium |
CM-2 |
Baseline Configuration |
Protects |
T1052 |
Exfiltration Over Physical Medium |
CM-6 |
Configuration Settings |
Protects |
T1052 |
Exfiltration Over Physical Medium |
CM-7 |
Least Functionality |
Protects |
T1052 |
Exfiltration Over Physical Medium |
CM-8 |
System Component Inventory |
Protects |
T1052 |
Exfiltration Over Physical Medium |
MP-7 |
Media Use |
Protects |
T1052 |
Exfiltration Over Physical Medium |
RA-5 |
Vulnerability Monitoring and Scanning |
Protects |
T1052 |
Exfiltration Over Physical Medium |
SA-8 |
Security and Privacy Engineering Principles |
Protects |
T1052 |
Exfiltration Over Physical Medium |
SC-28 |
Protection of Information at Rest |
Protects |
T1052 |
Exfiltration Over Physical Medium |
SC-41 |
Port and I/O Device Access |
Protects |
T1052 |
Exfiltration Over Physical Medium |
SI-3 |
Malicious Code Protection |
Protects |
T1052 |
Exfiltration Over Physical Medium |
SI-4 |
System Monitoring |
Protects |
T1052 |
Exfiltration Over Physical Medium |
SR-4 |
Provenance |
Protects |
T1052 |
Exfiltration Over Physical Medium |
action.malware.variety.Export data |
Export data to another site or system |
related-to |
T1052 |
Exfiltration Over Physical Medium |
attribute.confidentiality.data_disclosure |
|
related-to |
T1052 |
Exfiltration Over Physical Medium |