AC-16 |
Security and Privacy Attributes |
Protects |
T1567 |
Exfiltration Over Web Service |
AC-02 |
Account Management |
Protects |
T1567 |
Exfiltration Over Web Service |
AC-20 |
Use of External Systems |
Protects |
T1567 |
Exfiltration Over Web Service |
AC-23 |
Data Mining Protection |
Protects |
T1567 |
Exfiltration Over Web Service |
AC-03 |
Access Enforcement |
Protects |
T1567 |
Exfiltration Over Web Service |
AC-04 |
Information Flow Enforcement |
Protects |
T1567 |
Exfiltration Over Web Service |
AC-06 |
Least Privilege |
Protects |
T1567 |
Exfiltration Over Web Service |
CA-03 |
Information Exchange |
Protects |
T1567 |
Exfiltration Over Web Service |
CA-07 |
Continuous Monitoring |
Protects |
T1567 |
Exfiltration Over Web Service |
SA-08 |
Security and Privacy Engineering Principles |
Protects |
T1567 |
Exfiltration Over Web Service |
SA-09 |
External System Services |
Protects |
T1567 |
Exfiltration Over Web Service |
SC-28 |
Protection of Information at Rest |
Protects |
T1567 |
Exfiltration Over Web Service |
SC-31 |
Covert Channel Analysis |
Protects |
T1567 |
Exfiltration Over Web Service |
SC-07 |
Boundary Protection |
Protects |
T1567 |
Exfiltration Over Web Service |
SI-03 |
Malicious Code Protection |
Protects |
T1567 |
Exfiltration Over Web Service |
SI-04 |
System Monitoring |
Protects |
T1567 |
Exfiltration Over Web Service |
SR-04 |
Provenance |
Protects |
T1567 |
Exfiltration Over Web Service |
PUR-IP-E5 |
Information Protection |
Technique Scores |
T1567 |
Exfiltration Over Web Service |
DEF-SecScore-E3 |
Secure Score |
Technique Scores |
T1567 |
Exfiltration Over Web Service |
DEF-AIR-E5 |
Automated Investigation and Response |
Technique Scores |
T1567 |
Exfiltration Over Web Service |
DO365-ATH-E5 |
Advanced Threat Hunting |
Technique Scores |
T1567 |
Exfiltration Over Web Service |