CRI Profile DE.CM-09.02

The organization uses integrity checking mechanisms to verify hardware integrity.

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
DE.CM-09.02 Hardware integrity checking Mitigates T1562.001 Disable or Modify Tools
Comments
This diagnostic statement provides protection from Disable or Modify Tools through the implementation of integrity checking mechanisms. For example, integrity checking mechanisms to verify the operating system, software, firmware, and information integrity before loading it prevents abuse by a threat actor.
DE.CM-09.02 Hardware integrity checking Mitigates T1091 Replication Through Removable Media
Comments
This diagnostic statement provides protection from Replication Through Removable Media through the implementation of integrity checking mechanisms. For example, integrity checking mechanisms to verify the operating system, software, firmware, and information integrity before loading it prevents abuse by a threat actor.
DE.CM-09.02 Hardware integrity checking Mitigates T1542 Pre-OS Boot
Comments
This diagnostic statement provides protection from Pre-OS Boot through the implementation of integrity checking mechanisms. For example, integrity checking mechanisms to verify the operating system, software, firmware, and information integrity before loading it prevents abuse by a threat actor.
DE.CM-09.02 Hardware integrity checking Mitigates T1542.002 Component Firmware
Comments
This diagnostic statement provides protection from Component Firmware through the implementation of integrity checking mechanisms. For example, integrity checking mechanisms to verify the operating system, software, firmware, and information integrity before loading it prevents abuse by a threat actor.
DE.CM-09.02 Hardware integrity checking Mitigates T1600.002 Disable Crypto Hardware
Comments
This diagnostic statement provides protection from Disable Crypto Hardware through the implementation of integrity checking mechanisms. For example, integrity checking mechanisms to verify the operating system, software, firmware, and information integrity before loading it prevents abuse by a threat actor.
DE.CM-09.02 Hardware integrity checking Mitigates T1495 Firmware Corruption
Comments
This diagnostic statement provides protection from Firmware Corruption through the implementation of integrity checking mechanisms. For example, integrity checking mechanisms to verify the operating system, software, firmware, and information integrity before loading it prevents abuse by a threat actor.
DE.CM-09.02 Hardware integrity checking Mitigates T1542.001 System Firmware
Comments
This diagnostic statement provides protection from System Firmware through the implementation of integrity checking mechanisms. For example, integrity checking mechanisms to verify the operating system, software, firmware, and information integrity before loading it prevents abuse by a threat actor.
DE.CM-09.02 Hardware integrity checking Mitigates T1195.003 Compromise Hardware Supply Chain
Comments
This diagnostic statement provides protection from Compromise Hardware Supply Chain through the implementation of integrity checking mechanisms. For example, integrity checking mechanisms to verify the operating system, software, firmware, and information integrity before loading it prevents abuse by a threat actor.