Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
DE.CM-09.03 | Unauthorized software, hardware, or configuration changes | Mitigates | T1543 | Create or Modify System Process |
Comments
This Diagnostic Statement addresses measures for managing configuration integrity and unauthorized changes that can mitigate risks associated with adversary techniques attempting to make changes to how the hardware, software, and firmware operates.
|
DE.CM-09.03 | Unauthorized software, hardware, or configuration changes | Mitigates | T1601 | Modify System Image |
Comments
This Diagnostic Statement addresses measures for managing configuration integrity and unauthorized changes that can mitigate risks associated with adversary techniques attempting to make changes to how the hardware, software, and firmware operates.
|
DE.CM-09.03 | Unauthorized software, hardware, or configuration changes | Mitigates | T1556 | Modify Authentication Process |
Comments
This Diagnostic Statement addresses measures for managing configuration integrity and unauthorized changes that can mitigate risks associated with adversary techniques attempting to make changes to how the hardware, software, and firmware operates.
|
DE.CM-09.03 | Unauthorized software, hardware, or configuration changes | Mitigates | T1542.002 | Component Firmware |
Comments
This Diagnostic Statement addresses measures for managing configuration integrity and unauthorized changes that can mitigate risks associated with adversary techniques attempting to make changes to how the hardware, software, and firmware operates.
|
DE.CM-09.03 | Unauthorized software, hardware, or configuration changes | Mitigates | T1542.001 | System Firmware |
Comments
This Diagnostic Statement addresses measures for managing configuration integrity and unauthorized changes that can mitigate risks associated with adversary techniques attempting to make changes to how the hardware, software, and firmware operates.
|
DE.CM-09.03 | Unauthorized software, hardware, or configuration changes | Mitigates | T1495 | Firmware Corruption |
Comments
This Diagnostic Statement addresses measures for managing configuration integrity and unauthorized changes that can mitigate risks associated with adversary techniques attempting to make changes to how the hardware, software, and firmware operates.
|
DE.CM-09.03 | Unauthorized software, hardware, or configuration changes | Mitigates | T1562 | Impair Defenses |
Comments
This Diagnostic Statement addresses measures for managing configuration integrity and unauthorized changes that can mitigate risks associated with adversary techniques attempting to make changes to how the hardware, software, and firmware operates.
|