AC-16 |
Security and Privacy Attributes |
Protects |
T1213 |
Data from Information Repositories |
AC-17 |
Remote Access |
Protects |
T1213 |
Data from Information Repositories |
AC-02 |
Account Management |
Protects |
T1213 |
Data from Information Repositories |
AC-21 |
Information Sharing |
Protects |
T1213 |
Data from Information Repositories |
AC-23 |
Data Mining Protection |
Protects |
T1213 |
Data from Information Repositories |
AC-03 |
Access Enforcement |
Protects |
T1213 |
Data from Information Repositories |
AC-04 |
Information Flow Enforcement |
Protects |
T1213 |
Data from Information Repositories |
AC-05 |
Separation of Duties |
Protects |
T1213 |
Data from Information Repositories |
AC-06 |
Least Privilege |
Protects |
T1213 |
Data from Information Repositories |
CA-07 |
Continuous Monitoring |
Protects |
T1213 |
Data from Information Repositories |
CA-08 |
Penetration Testing |
Protects |
T1213 |
Data from Information Repositories |
CM-02 |
Baseline Configuration |
Protects |
T1213 |
Data from Information Repositories |
CM-03 |
Configuration Change Control |
Protects |
T1213 |
Data from Information Repositories |
CM-05 |
Access Restrictions for Change |
Protects |
T1213 |
Data from Information Repositories |
CM-06 |
Configuration Settings |
Protects |
T1213 |
Data from Information Repositories |
CM-07 |
Least Functionality |
Protects |
T1213 |
Data from Information Repositories |
CM-08 |
System Component Inventory |
Protects |
T1213 |
Data from Information Repositories |
IA-02 |
Identification and Authentication (organizational Users) |
Protects |
T1213 |
Data from Information Repositories |
IA-04 |
Identifier Management |
Protects |
T1213 |
Data from Information Repositories |
IA-08 |
Identification and Authentication (non-organizational Users) |
Protects |
T1213 |
Data from Information Repositories |
RA-05 |
Vulnerability Monitoring and Scanning |
Protects |
T1213 |
Data from Information Repositories |
SC-28 |
Protection of Information at Rest |
Protects |
T1213 |
Data from Information Repositories |
SI-04 |
System Monitoring |
Protects |
T1213 |
Data from Information Repositories |
SI-07 |
Software, Firmware, and Information Integrity |
Protects |
T1213 |
Data from Information Repositories |
PUR-AS-E5 |
Audit Solutions |
Technique Scores |
T1213 |
Data from Information Repositories |
ME-RBAC-E3 |
Role Based Access Control |
Technique Scores |
T1213 |
Data from Information Repositories |
DEF-SecScore-E3 |
Secure Score |
Technique Scores |
T1213 |
Data from Information Repositories |
DEF-Quarantine-E3 |
Quarantine Policies |
Technique Scores |
T1213 |
Data from Information Repositories |
DEF-IR-E5 |
Incident Response |
Technique Scores |
T1213 |
Data from Information Repositories |
PUR-PAM-E5 |
Privileged Access Management |
Technique Scores |
T1213 |
Data from Information Repositories |