CRI Profile DE.CM-09.03

The organization has policies, procedures, and tools in place to monitor for, detect, and block the use of unsupported or unauthorized software, hardware, or configuration changes.

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
DE.CM-09.03 Unauthorized software, hardware, or configuration changes Mitigates T1543 Create or Modify System Process
Comments
This Diagnostic Statement addresses measures for managing configuration integrity and unauthorized changes that can mitigate risks associated with adversary techniques attempting to make changes to how the hardware, software, and firmware operates.
DE.CM-09.03 Unauthorized software, hardware, or configuration changes Mitigates T1601 Modify System Image
Comments
This Diagnostic Statement addresses measures for managing configuration integrity and unauthorized changes that can mitigate risks associated with adversary techniques attempting to make changes to how the hardware, software, and firmware operates.
DE.CM-09.03 Unauthorized software, hardware, or configuration changes Mitigates T1556 Modify Authentication Process
Comments
This Diagnostic Statement addresses measures for managing configuration integrity and unauthorized changes that can mitigate risks associated with adversary techniques attempting to make changes to how the hardware, software, and firmware operates.
DE.CM-09.03 Unauthorized software, hardware, or configuration changes Mitigates T1542.002 Component Firmware
Comments
This Diagnostic Statement addresses measures for managing configuration integrity and unauthorized changes that can mitigate risks associated with adversary techniques attempting to make changes to how the hardware, software, and firmware operates.
DE.CM-09.03 Unauthorized software, hardware, or configuration changes Mitigates T1542.001 System Firmware
Comments
This Diagnostic Statement addresses measures for managing configuration integrity and unauthorized changes that can mitigate risks associated with adversary techniques attempting to make changes to how the hardware, software, and firmware operates.
DE.CM-09.03 Unauthorized software, hardware, or configuration changes Mitigates T1495 Firmware Corruption
Comments
This Diagnostic Statement addresses measures for managing configuration integrity and unauthorized changes that can mitigate risks associated with adversary techniques attempting to make changes to how the hardware, software, and firmware operates.
DE.CM-09.03 Unauthorized software, hardware, or configuration changes Mitigates T1562 Impair Defenses
Comments
This Diagnostic Statement addresses measures for managing configuration integrity and unauthorized changes that can mitigate risks associated with adversary techniques attempting to make changes to how the hardware, software, and firmware operates.