AC-17 |
Remote Access |
Protects |
T1563 |
Remote Service Session Hijacking |
AC-2 |
Account Management |
Protects |
T1563 |
Remote Service Session Hijacking |
AC-3 |
Access Enforcement |
Protects |
T1563 |
Remote Service Session Hijacking |
AC-4 |
Information Flow Enforcement |
Protects |
T1563 |
Remote Service Session Hijacking |
AC-5 |
Separation of Duties |
Protects |
T1563 |
Remote Service Session Hijacking |
AC-6 |
Least Privilege |
Protects |
T1563 |
Remote Service Session Hijacking |
CA-8 |
Penetration Testing |
Protects |
T1563 |
Remote Service Session Hijacking |
CM-2 |
Baseline Configuration |
Protects |
T1563 |
Remote Service Session Hijacking |
CM-5 |
Access Restrictions for Change |
Protects |
T1563 |
Remote Service Session Hijacking |
CM-6 |
Configuration Settings |
Protects |
T1563 |
Remote Service Session Hijacking |
CM-7 |
Least Functionality |
Protects |
T1563 |
Remote Service Session Hijacking |
CM-8 |
System Component Inventory |
Protects |
T1563 |
Remote Service Session Hijacking |
IA-2 |
Identification and Authentication (organizational Users) |
Protects |
T1563 |
Remote Service Session Hijacking |
IA-4 |
Identifier Management |
Protects |
T1563 |
Remote Service Session Hijacking |
IA-6 |
Authentication Feedback |
Protects |
T1563 |
Remote Service Session Hijacking |
RA-5 |
Vulnerability Monitoring and Scanning |
Protects |
T1563 |
Remote Service Session Hijacking |
SC-46 |
Cross Domain Policy Enforcement |
Protects |
T1563 |
Remote Service Session Hijacking |
SC-7 |
Boundary Protection |
Protects |
T1563 |
Remote Service Session Hijacking |
SI-4 |
System Monitoring |
Protects |
T1563 |
Remote Service Session Hijacking |
alerts_for_windows_machines |
Alerts for Windows Machines |
technique_scores |
T1563 |
Remote Service Session Hijacking |
azure_network_traffic_analytics |
Azure Network Traffic Analytics |
technique_scores |
T1563 |
Remote Service Session Hijacking |