AC-17 |
Remote Access |
Protects |
T1543 |
Create or Modify System Process |
AC-2 |
Account Management |
Protects |
T1543 |
Create or Modify System Process |
AC-3 |
Access Enforcement |
Protects |
T1543 |
Create or Modify System Process |
AC-5 |
Separation of Duties |
Protects |
T1543 |
Create or Modify System Process |
AC-6 |
Least Privilege |
Protects |
T1543 |
Create or Modify System Process |
CA-7 |
Continuous Monitoring |
Protects |
T1543 |
Create or Modify System Process |
CA-8 |
Penetration Testing |
Protects |
T1543 |
Create or Modify System Process |
CM-11 |
User-installed Software |
Protects |
T1543 |
Create or Modify System Process |
CM-2 |
Baseline Configuration |
Protects |
T1543 |
Create or Modify System Process |
CM-3 |
Configuration Change Control |
Protects |
T1543 |
Create or Modify System Process |
CM-5 |
Access Restrictions for Change |
Protects |
T1543 |
Create or Modify System Process |
CM-6 |
Configuration Settings |
Protects |
T1543 |
Create or Modify System Process |
CM-7 |
Least Functionality |
Protects |
T1543 |
Create or Modify System Process |
IA-2 |
Identification and Authentication (organizational Users) |
Protects |
T1543 |
Create or Modify System Process |
IA-4 |
Identifier Management |
Protects |
T1543 |
Create or Modify System Process |
RA-5 |
Vulnerability Monitoring and Scanning |
Protects |
T1543 |
Create or Modify System Process |
SA-22 |
Unsupported System Components |
Protects |
T1543 |
Create or Modify System Process |
SI-16 |
Memory Protection |
Protects |
T1543 |
Create or Modify System Process |
SI-3 |
Malicious Code Protection |
Protects |
T1543 |
Create or Modify System Process |
SI-4 |
System Monitoring |
Protects |
T1543 |
Create or Modify System Process |
SI-7 |
Software, Firmware, and Information Integrity |
Protects |
T1543 |
Create or Modify System Process |
action.hacking.variety.Abuse of functionality |
Abuse of functionality. |
related-to |
T1543 |
Create or Modify System Process |
action.hacking.variety.Backdoor |
Hacking action that creates a backdoor for use. |
related-to |
T1543 |
Create or Modify System Process |
action.hacking.vector.Backdoor |
Hacking actions taken through a backdoor. C2 is only used by malware. |
related-to |
T1543 |
Create or Modify System Process |
action.malware.variety.Backdoor |
Malware creates a backdoor capability for hacking. Child of 'RAT' when combined with 'Trojan'. Child of 'Backdoor or C2'. |
related-to |
T1543 |
Create or Modify System Process |
action.malware.variety.Backdoor or C2 |
Malware creates a remote control capability, but it's unclear if it's a backdoor for hacking or C2 for malware. Parent of 'C2' and 'Backdoor'. |
related-to |
T1543 |
Create or Modify System Process |
action.malware.variety.Rootkit |
Rootkit (maintain local privileges and stealth) |
related-to |
T1543 |
Create or Modify System Process |
attribute.integrity.variety.Software installation |
Software installation or code modification |
related-to |
T1543 |
Create or Modify System Process |