AC-16 |
Security and Privacy Attributes |
Protects |
T1213 |
Data from Information Repositories |
AC-17 |
Remote Access |
Protects |
T1213 |
Data from Information Repositories |
AC-2 |
Account Management |
Protects |
T1213 |
Data from Information Repositories |
AC-21 |
Information Sharing |
Protects |
T1213 |
Data from Information Repositories |
AC-23 |
Data Mining Protection |
Protects |
T1213 |
Data from Information Repositories |
AC-3 |
Access Enforcement |
Protects |
T1213 |
Data from Information Repositories |
AC-4 |
Information Flow Enforcement |
Protects |
T1213 |
Data from Information Repositories |
AC-5 |
Separation of Duties |
Protects |
T1213 |
Data from Information Repositories |
AC-6 |
Least Privilege |
Protects |
T1213 |
Data from Information Repositories |
CA-7 |
Continuous Monitoring |
Protects |
T1213 |
Data from Information Repositories |
CA-8 |
Penetration Testing |
Protects |
T1213 |
Data from Information Repositories |
CM-2 |
Baseline Configuration |
Protects |
T1213 |
Data from Information Repositories |
CM-3 |
Configuration Change Control |
Protects |
T1213 |
Data from Information Repositories |
CM-5 |
Access Restrictions for Change |
Protects |
T1213 |
Data from Information Repositories |
CM-6 |
Configuration Settings |
Protects |
T1213 |
Data from Information Repositories |
CM-7 |
Least Functionality |
Protects |
T1213 |
Data from Information Repositories |
CM-8 |
System Component Inventory |
Protects |
T1213 |
Data from Information Repositories |
IA-2 |
Identification and Authentication (organizational Users) |
Protects |
T1213 |
Data from Information Repositories |
IA-4 |
Identifier Management |
Protects |
T1213 |
Data from Information Repositories |
IA-8 |
Identification and Authentication (non-organizational Users) |
Protects |
T1213 |
Data from Information Repositories |
RA-5 |
Vulnerability Monitoring and Scanning |
Protects |
T1213 |
Data from Information Repositories |
SC-28 |
Protection of Information at Rest |
Protects |
T1213 |
Data from Information Repositories |
SI-4 |
System Monitoring |
Protects |
T1213 |
Data from Information Repositories |
SI-7 |
Software, Firmware, and Information Integrity |
Protects |
T1213 |
Data from Information Repositories |
action.hacking.variety.XML external entities |
XML external entities. Child of 'Exploit vuln'. |
related-to |
T1213 |
Data from Information Repository |
action.malware.variety.Capture stored data |
Capture data stored on system disk |
related-to |
T1213 |
Data from Information Repository |
attribute.confidentiality.data_disclosure |
|
related-to |
T1213 |
Data from Information Repository |