AC-16 |
Security and Privacy Attributes |
Protects |
T1505 |
Server Software Component |
AC-02 |
Account Management |
Protects |
T1505 |
Server Software Component |
AC-03 |
Access Enforcement |
Protects |
T1505 |
Server Software Component |
AC-05 |
Separation of Duties |
Protects |
T1505 |
Server Software Component |
AC-06 |
Least Privilege |
Protects |
T1505 |
Server Software Component |
CA-08 |
Penetration Testing |
Protects |
T1505 |
Server Software Component |
CM-11 |
User-installed Software |
Protects |
T1505 |
Server Software Component |
CM-02 |
Baseline Configuration |
Protects |
T1505 |
Server Software Component |
CM-05 |
Access Restrictions for Change |
Protects |
T1505 |
Server Software Component |
CM-06 |
Configuration Settings |
Protects |
T1505 |
Server Software Component |
CM-08 |
System Component Inventory |
Protects |
T1505 |
Server Software Component |
IA-02 |
Identification and Authentication (organizational Users) |
Protects |
T1505 |
Server Software Component |
RA-05 |
Vulnerability Monitoring and Scanning |
Protects |
T1505 |
Server Software Component |
SA-10 |
Developer Configuration Management |
Protects |
T1505 |
Server Software Component |
SA-11 |
Developer Testing and Evaluation |
Protects |
T1505 |
Server Software Component |
SC-16 |
Transmission of Security and Privacy Attributes |
Protects |
T1505 |
Server Software Component |
SI-14 |
Non-persistence |
Protects |
T1505 |
Server Software Component |
SI-04 |
System Monitoring |
Protects |
T1505 |
Server Software Component |
SI-07 |
Software, Firmware, and Information Integrity |
Protects |
T1505 |
Server Software Component |
SR-11 |
Component Authenticity |
Protects |
T1505 |
Server Software Component |
SR-04 |
Provenance |
Protects |
T1505 |
Server Software Component |
SR-05 |
Acquisition Strategies, Tools, and Methods |
Protects |
T1505 |
Server Software Component |
SR-06 |
Supplier Assessments and Reviews |
Protects |
T1505 |
Server Software Component |