AC-16
|
Security and Privacy Attributes
| Protects |
T1505
|
Server Software Component
|
AC-02
|
Account Management
| Protects |
T1505
|
Server Software Component
|
AC-03
|
Access Enforcement
| Protects |
T1505
|
Server Software Component
|
AC-05
|
Separation of Duties
| Protects |
T1505
|
Server Software Component
|
AC-06
|
Least Privilege
| Protects |
T1505
|
Server Software Component
|
CA-08
|
Penetration Testing
| Protects |
T1505
|
Server Software Component
|
CM-11
|
User-installed Software
| Protects |
T1505
|
Server Software Component
|
CM-02
|
Baseline Configuration
| Protects |
T1505
|
Server Software Component
|
CM-05
|
Access Restrictions for Change
| Protects |
T1505
|
Server Software Component
|
CM-06
|
Configuration Settings
| Protects |
T1505
|
Server Software Component
|
CM-08
|
System Component Inventory
| Protects |
T1505
|
Server Software Component
|
IA-02
|
Identification and Authentication (organizational Users)
| Protects |
T1505
|
Server Software Component
|
RA-05
|
Vulnerability Monitoring and Scanning
| Protects |
T1505
|
Server Software Component
|
SA-10
|
Developer Configuration Management
| Protects |
T1505
|
Server Software Component
|
SA-11
|
Developer Testing and Evaluation
| Protects |
T1505
|
Server Software Component
|
SC-16
|
Transmission of Security and Privacy Attributes
| Protects |
T1505
|
Server Software Component
|
SI-14
|
Non-persistence
| Protects |
T1505
|
Server Software Component
|
SI-04
|
System Monitoring
| Protects |
T1505
|
Server Software Component
|
SI-07
|
Software, Firmware, and Information Integrity
| Protects |
T1505
|
Server Software Component
|
SR-11
|
Component Authenticity
| Protects |
T1505
|
Server Software Component
|
SR-04
|
Provenance
| Protects |
T1505
|
Server Software Component
|
SR-05
|
Acquisition Strategies, Tools, and Methods
| Protects |
T1505
|
Server Software Component
|
SR-06
|
Supplier Assessments and Reviews
| Protects |
T1505
|
Server Software Component
|