AC-04 |
Information Flow Enforcement |
Protects |
T1001 |
Data Obfuscation |
CA-07 |
Continuous Monitoring |
Protects |
T1001 |
Data Obfuscation |
CM-02 |
Baseline Configuration |
Protects |
T1001 |
Data Obfuscation |
CM-06 |
Configuration Settings |
Protects |
T1001 |
Data Obfuscation |
SC-07 |
Boundary Protection |
Protects |
T1001 |
Data Obfuscation |
SI-03 |
Malicious Code Protection |
Protects |
T1001 |
Data Obfuscation |
SI-04 |
System Monitoring |
Protects |
T1001 |
Data Obfuscation |
AC-04 |
Information Flow Enforcement |
Protects |
T1001.001 |
Junk Data |
CA-07 |
Continuous Monitoring |
Protects |
T1001.001 |
Junk Data |
CM-02 |
Baseline Configuration |
Protects |
T1001.001 |
Junk Data |
CM-06 |
Configuration Settings |
Protects |
T1001.001 |
Junk Data |
SC-07 |
Boundary Protection |
Protects |
T1001.001 |
Junk Data |
SI-03 |
Malicious Code Protection |
Protects |
T1001.001 |
Junk Data |
SI-04 |
System Monitoring |
Protects |
T1001.001 |
Junk Data |
AC-04 |
Information Flow Enforcement |
Protects |
T1001.002 |
Steganography |
CA-07 |
Continuous Monitoring |
Protects |
T1001.002 |
Steganography |
CM-02 |
Baseline Configuration |
Protects |
T1001.002 |
Steganography |
CM-06 |
Configuration Settings |
Protects |
T1001.002 |
Steganography |
SC-07 |
Boundary Protection |
Protects |
T1001.002 |
Steganography |
SI-03 |
Malicious Code Protection |
Protects |
T1001.002 |
Steganography |
SI-04 |
System Monitoring |
Protects |
T1001.002 |
Steganography |
AC-04 |
Information Flow Enforcement |
Protects |
T1001.003 |
Protocol Impersonation |
CA-07 |
Continuous Monitoring |
Protects |
T1001.003 |
Protocol Impersonation |
CM-02 |
Baseline Configuration |
Protects |
T1001.003 |
Protocol Impersonation |
CM-06 |
Configuration Settings |
Protects |
T1001.003 |
Protocol Impersonation |
SC-07 |
Boundary Protection |
Protects |
T1001.003 |
Protocol Impersonation |
SI-03 |
Malicious Code Protection |
Protects |
T1001.003 |
Protocol Impersonation |
SI-04 |
System Monitoring |
Protects |
T1001.003 |
Protocol Impersonation |
AC-16 |
Security and Privacy Attributes |
Protects |
T1003 |
OS Credential Dumping |
AC-02 |
Account Management |
Protects |
T1003 |
OS Credential Dumping |
AC-03 |
Access Enforcement |
Protects |
T1003 |
OS Credential Dumping |
AC-04 |
Information Flow Enforcement |
Protects |
T1003 |
OS Credential Dumping |
AC-05 |
Separation of Duties |
Protects |
T1003 |
OS Credential Dumping |
AC-06 |
Least Privilege |
Protects |
T1003 |
OS Credential Dumping |
CA-07 |
Continuous Monitoring |
Protects |
T1003 |
OS Credential Dumping |
CM-02 |
Baseline Configuration |
Protects |
T1003 |
OS Credential Dumping |
CM-05 |
Access Restrictions for Change |
Protects |
T1003 |
OS Credential Dumping |
CM-06 |
Configuration Settings |
Protects |
T1003 |
OS Credential Dumping |
CM-07 |
Least Functionality |
Protects |
T1003 |
OS Credential Dumping |
CP-09 |
System Backup |
Protects |
T1003 |
OS Credential Dumping |
IA-02 |
Identification and Authentication (organizational Users) |
Protects |
T1003 |
OS Credential Dumping |
IA-04 |
Identifier Management |
Protects |
T1003 |
OS Credential Dumping |
IA-05 |
Authenticator Management |
Protects |
T1003 |
OS Credential Dumping |
SC-28 |
Protection of Information at Rest |
Protects |
T1003 |
OS Credential Dumping |
SC-39 |
Process Isolation |
Protects |
T1003 |
OS Credential Dumping |
SI-12 |
Information Management and Retention |
Protects |
T1003 |
OS Credential Dumping |
SI-02 |
Flaw Remediation |
Protects |
T1003 |
OS Credential Dumping |
SI-03 |
Malicious Code Protection |
Protects |
T1003 |
OS Credential Dumping |
SI-04 |
System Monitoring |
Protects |
T1003 |
OS Credential Dumping |
SI-07 |
Software, Firmware, and Information Integrity |
Protects |
T1003 |
OS Credential Dumping |
AC-16 |
Security and Privacy Attributes |
Protects |
T1003.003 |
NTDS |
AC-02 |
Account Management |
Protects |
T1003.003 |
NTDS |
AC-03 |
Access Enforcement |
Protects |
T1003.003 |
NTDS |
AC-05 |
Separation of Duties |
Protects |
T1003.003 |
NTDS |
AC-06 |
Least Privilege |
Protects |
T1003.003 |
NTDS |
CA-07 |
Continuous Monitoring |
Protects |
T1003.003 |
NTDS |
CM-02 |
Baseline Configuration |
Protects |
T1003.003 |
NTDS |
CM-05 |
Access Restrictions for Change |
Protects |
T1003.003 |
NTDS |
CM-06 |
Configuration Settings |
Protects |
T1003.003 |
NTDS |
CP-09 |
System Backup |
Protects |
T1003.003 |
NTDS |
IA-02 |
Identification and Authentication (organizational Users) |
Protects |
T1003.003 |
NTDS |
IA-05 |
Authenticator Management |
Protects |
T1003.003 |
NTDS |
SC-28 |
Protection of Information at Rest |
Protects |
T1003.003 |
NTDS |
SC-39 |
Process Isolation |
Protects |
T1003.003 |
NTDS |
SI-12 |
Information Management and Retention |
Protects |
T1003.003 |
NTDS |
SI-03 |
Malicious Code Protection |
Protects |
T1003.003 |
NTDS |
SI-04 |
System Monitoring |
Protects |
T1003.003 |
NTDS |
SI-07 |
Software, Firmware, and Information Integrity |
Protects |
T1003.003 |
NTDS |
AC-02 |
Account Management |
Protects |
T1003.004 |
LSA Secrets |
AC-03 |
Access Enforcement |
Protects |
T1003.004 |
LSA Secrets |
AC-05 |
Separation of Duties |
Protects |
T1003.004 |
LSA Secrets |
AC-06 |
Least Privilege |
Protects |
T1003.004 |
LSA Secrets |
CA-07 |
Continuous Monitoring |
Protects |
T1003.004 |
LSA Secrets |
CM-02 |
Baseline Configuration |
Protects |
T1003.004 |
LSA Secrets |
CM-05 |
Access Restrictions for Change |
Protects |
T1003.004 |
LSA Secrets |
CM-06 |
Configuration Settings |
Protects |
T1003.004 |
LSA Secrets |
IA-02 |
Identification and Authentication (organizational Users) |
Protects |
T1003.004 |
LSA Secrets |
IA-05 |
Authenticator Management |
Protects |
T1003.004 |
LSA Secrets |
SC-28 |
Protection of Information at Rest |
Protects |
T1003.004 |
LSA Secrets |
SC-39 |
Process Isolation |
Protects |
T1003.004 |
LSA Secrets |
SI-03 |
Malicious Code Protection |
Protects |
T1003.004 |
LSA Secrets |
SI-04 |
System Monitoring |
Protects |
T1003.004 |
LSA Secrets |
AC-02 |
Account Management |
Protects |
T1003.005 |
Cached Domain Credentials |
AC-03 |
Access Enforcement |
Protects |
T1003.005 |
Cached Domain Credentials |
AC-04 |
Information Flow Enforcement |
Protects |
T1003.005 |
Cached Domain Credentials |
AC-05 |
Separation of Duties |
Protects |
T1003.005 |
Cached Domain Credentials |
AC-06 |
Least Privilege |
Protects |
T1003.005 |
Cached Domain Credentials |
CA-07 |
Continuous Monitoring |
Protects |
T1003.005 |
Cached Domain Credentials |
CM-02 |
Baseline Configuration |
Protects |
T1003.005 |
Cached Domain Credentials |
CM-05 |
Access Restrictions for Change |
Protects |
T1003.005 |
Cached Domain Credentials |
CM-06 |
Configuration Settings |
Protects |
T1003.005 |
Cached Domain Credentials |
CM-07 |
Least Functionality |
Protects |
T1003.005 |
Cached Domain Credentials |
IA-02 |
Identification and Authentication (organizational Users) |
Protects |
T1003.005 |
Cached Domain Credentials |
IA-04 |
Identifier Management |
Protects |
T1003.005 |
Cached Domain Credentials |
IA-05 |
Authenticator Management |
Protects |
T1003.005 |
Cached Domain Credentials |
SC-28 |
Protection of Information at Rest |
Protects |
T1003.005 |
Cached Domain Credentials |
SC-39 |
Process Isolation |
Protects |
T1003.005 |
Cached Domain Credentials |
SI-03 |
Malicious Code Protection |
Protects |
T1003.005 |
Cached Domain Credentials |
SI-04 |
System Monitoring |
Protects |
T1003.005 |
Cached Domain Credentials |
AC-02 |
Account Management |
Protects |
T1003.006 |
DCSync |
AC-03 |
Access Enforcement |
Protects |
T1003.006 |
DCSync |
AC-04 |
Information Flow Enforcement |
Protects |
T1003.006 |
DCSync |
AC-05 |
Separation of Duties |
Protects |
T1003.006 |
DCSync |
AC-06 |
Least Privilege |
Protects |
T1003.006 |
DCSync |
CA-07 |
Continuous Monitoring |
Protects |
T1003.006 |
DCSync |
CM-02 |
Baseline Configuration |
Protects |
T1003.006 |
DCSync |
CM-05 |
Access Restrictions for Change |
Protects |
T1003.006 |
DCSync |
CM-06 |
Configuration Settings |
Protects |
T1003.006 |
DCSync |
IA-02 |
Identification and Authentication (organizational Users) |
Protects |
T1003.006 |
DCSync |
IA-04 |
Identifier Management |
Protects |
T1003.006 |
DCSync |
IA-05 |
Authenticator Management |
Protects |
T1003.006 |
DCSync |
SC-28 |
Protection of Information at Rest |
Protects |
T1003.006 |
DCSync |
SC-39 |
Process Isolation |
Protects |
T1003.006 |
DCSync |
SI-03 |
Malicious Code Protection |
Protects |
T1003.006 |
DCSync |
SI-04 |
System Monitoring |
Protects |
T1003.006 |
DCSync |
AC-02 |
Account Management |
Protects |
T1003.008 |
/etc/passwd and /etc/shadow |
AC-03 |
Access Enforcement |
Protects |
T1003.008 |
/etc/passwd and /etc/shadow |
AC-05 |
Separation of Duties |
Protects |
T1003.008 |
/etc/passwd and /etc/shadow |
AC-06 |
Least Privilege |
Protects |
T1003.008 |
/etc/passwd and /etc/shadow |
CA-07 |
Continuous Monitoring |
Protects |
T1003.008 |
/etc/passwd and /etc/shadow |
CM-02 |
Baseline Configuration |
Protects |
T1003.008 |
/etc/passwd and /etc/shadow |
CM-05 |
Access Restrictions for Change |
Protects |
T1003.008 |
/etc/passwd and /etc/shadow |
CM-06 |
Configuration Settings |
Protects |
T1003.008 |
/etc/passwd and /etc/shadow |
IA-02 |
Identification and Authentication (organizational Users) |
Protects |
T1003.008 |
/etc/passwd and /etc/shadow |
IA-05 |
Authenticator Management |
Protects |
T1003.008 |
/etc/passwd and /etc/shadow |
SC-28 |
Protection of Information at Rest |
Protects |
T1003.008 |
/etc/passwd and /etc/shadow |
SC-39 |
Process Isolation |
Protects |
T1003.008 |
/etc/passwd and /etc/shadow |
SI-03 |
Malicious Code Protection |
Protects |
T1003.008 |
/etc/passwd and /etc/shadow |
SI-04 |
System Monitoring |
Protects |
T1003.008 |
/etc/passwd and /etc/shadow |
AC-04 |
Information Flow Enforcement |
Protects |
T1008 |
Fallback Channels |
CA-07 |
Continuous Monitoring |
Protects |
T1008 |
Fallback Channels |
CM-02 |
Baseline Configuration |
Protects |
T1008 |
Fallback Channels |
CM-06 |
Configuration Settings |
Protects |
T1008 |
Fallback Channels |
CM-07 |
Least Functionality |
Protects |
T1008 |
Fallback Channels |
SC-07 |
Boundary Protection |
Protects |
T1008 |
Fallback Channels |
SI-03 |
Malicious Code Protection |
Protects |
T1008 |
Fallback Channels |
SI-04 |
System Monitoring |
Protects |
T1008 |
Fallback Channels |
AC-17 |
Remote Access |
Protects |
T1021.003 |
Distributed Component Object Model |
AC-02 |
Account Management |
Protects |
T1021.003 |
Distributed Component Object Model |
AC-03 |
Access Enforcement |
Protects |
T1021.003 |
Distributed Component Object Model |
AC-04 |
Information Flow Enforcement |
Protects |
T1021.003 |
Distributed Component Object Model |
AC-05 |
Separation of Duties |
Protects |
T1021.003 |
Distributed Component Object Model |
AC-06 |
Least Privilege |
Protects |
T1021.003 |
Distributed Component Object Model |
CM-02 |
Baseline Configuration |
Protects |
T1021.003 |
Distributed Component Object Model |
CM-05 |
Access Restrictions for Change |
Protects |
T1021.003 |
Distributed Component Object Model |
CM-06 |
Configuration Settings |
Protects |
T1021.003 |
Distributed Component Object Model |
CM-07 |
Least Functionality |
Protects |
T1021.003 |
Distributed Component Object Model |
CM-08 |
System Component Inventory |
Protects |
T1021.003 |
Distributed Component Object Model |
IA-02 |
Identification and Authentication (organizational Users) |
Protects |
T1021.003 |
Distributed Component Object Model |
RA-05 |
Vulnerability Monitoring and Scanning |
Protects |
T1021.003 |
Distributed Component Object Model |
SC-18 |
Mobile Code |
Protects |
T1021.003 |
Distributed Component Object Model |
SC-03 |
Security Function Isolation |
Protects |
T1021.003 |
Distributed Component Object Model |
SC-46 |
Cross Domain Policy Enforcement |
Protects |
T1021.003 |
Distributed Component Object Model |
SC-07 |
Boundary Protection |
Protects |
T1021.003 |
Distributed Component Object Model |
SI-03 |
Malicious Code Protection |
Protects |
T1021.003 |
Distributed Component Object Model |
SI-04 |
System Monitoring |
Protects |
T1021.003 |
Distributed Component Object Model |
AC-17 |
Remote Access |
Protects |
T1021.004 |
SSH |
AC-02 |
Account Management |
Protects |
T1021.004 |
SSH |
AC-20 |
Use of External Systems |
Protects |
T1021.004 |
SSH |
AC-03 |
Access Enforcement |
Protects |
T1021.004 |
SSH |
AC-05 |
Separation of Duties |
Protects |
T1021.004 |
SSH |
AC-06 |
Least Privilege |
Protects |
T1021.004 |
SSH |
AC-07 |
Unsuccessful Logon Attempts |
Protects |
T1021.004 |
SSH |
CM-02 |
Baseline Configuration |
Protects |
T1021.004 |
SSH |
CM-05 |
Access Restrictions for Change |
Protects |
T1021.004 |
SSH |
CM-06 |
Configuration Settings |
Protects |
T1021.004 |
SSH |
CM-08 |
System Component Inventory |
Protects |
T1021.004 |
SSH |
IA-02 |
Identification and Authentication (organizational Users) |
Protects |
T1021.004 |
SSH |
IA-05 |
Authenticator Management |
Protects |
T1021.004 |
SSH |
RA-05 |
Vulnerability Monitoring and Scanning |
Protects |
T1021.004 |
SSH |
SI-04 |
System Monitoring |
Protects |
T1021.004 |
SSH |
AC-17 |
Remote Access |
Protects |
T1021.005 |
VNC |
AC-02 |
Account Management |
Protects |
T1021.005 |
VNC |
AC-03 |
Access Enforcement |
Protects |
T1021.005 |
VNC |
AC-04 |
Information Flow Enforcement |
Protects |
T1021.005 |
VNC |
AC-06 |
Least Privilege |
Protects |
T1021.005 |
VNC |
CA-07 |
Continuous Monitoring |
Protects |
T1021.005 |
VNC |
CA-08 |
Penetration Testing |
Protects |
T1021.005 |
VNC |
CM-11 |
User-installed Software |
Protects |
T1021.005 |
VNC |
CM-02 |
Baseline Configuration |
Protects |
T1021.005 |
VNC |
CM-03 |
Configuration Change Control |
Protects |
T1021.005 |
VNC |
CM-05 |
Access Restrictions for Change |
Protects |
T1021.005 |
VNC |
CM-06 |
Configuration Settings |
Protects |
T1021.005 |
VNC |
CM-07 |
Least Functionality |
Protects |
T1021.005 |
VNC |
CM-08 |
System Component Inventory |
Protects |
T1021.005 |
VNC |
IA-02 |
Identification and Authentication (organizational Users) |
Protects |
T1021.005 |
VNC |
IA-04 |
Identifier Management |
Protects |
T1021.005 |
VNC |
IA-06 |
Authentication Feedback |
Protects |
T1021.005 |
VNC |
RA-05 |
Vulnerability Monitoring and Scanning |
Protects |
T1021.005 |
VNC |
SC-07 |
Boundary Protection |
Protects |
T1021.005 |
VNC |
SI-10 |
Information Input Validation |
Protects |
T1021.005 |
VNC |
SI-15 |
Information Output Filtering |
Protects |
T1021.005 |
VNC |
SI-03 |
Malicious Code Protection |
Protects |
T1021.005 |
VNC |
SI-04 |
System Monitoring |
Protects |
T1021.005 |
VNC |
AC-16 |
Security and Privacy Attributes |
Protects |
T1025 |
Data from Removable Media |
AC-02 |
Account Management |
Protects |
T1025 |
Data from Removable Media |
AC-23 |
Data Mining Protection |
Protects |
T1025 |
Data from Removable Media |
AC-03 |
Access Enforcement |
Protects |
T1025 |
Data from Removable Media |
AC-06 |
Least Privilege |
Protects |
T1025 |
Data from Removable Media |
CM-12 |
Information Location |
Protects |
T1025 |
Data from Removable Media |
CP-09 |
System Backup |
Protects |
T1025 |
Data from Removable Media |
MP-07 |
Media Use |
Protects |
T1025 |
Data from Removable Media |
SA-08 |
Security and Privacy Engineering Principles |
Protects |
T1025 |
Data from Removable Media |
SC-13 |
Cryptographic Protection |
Protects |
T1025 |
Data from Removable Media |
SC-28 |
Protection of Information at Rest |
Protects |
T1025 |
Data from Removable Media |
SC-38 |
Operations Security |
Protects |
T1025 |
Data from Removable Media |
SC-41 |
Port and I/O Device Access |
Protects |
T1025 |
Data from Removable Media |
SI-03 |
Malicious Code Protection |
Protects |
T1025 |
Data from Removable Media |
SI-04 |
System Monitoring |
Protects |
T1025 |
Data from Removable Media |
SI-02 |
Flaw Remediation |
Protects |
T1027.002 |
Software Packing |
SI-03 |
Malicious Code Protection |
Protects |
T1027.002 |
Software Packing |
SI-04 |
System Monitoring |
Protects |
T1027.002 |
Software Packing |
SI-07 |
Software, Firmware, and Information Integrity |
Protects |
T1027.002 |
Software Packing |
SI-02 |
Flaw Remediation |
Protects |
T1027.007 |
Dynamic API Resolution |
SI-03 |
Malicious Code Protection |
Protects |
T1027.007 |
Dynamic API Resolution |
SI-04 |
System Monitoring |
Protects |
T1027.007 |
Dynamic API Resolution |
SI-07 |
Software, Firmware, and Information Integrity |
Protects |
T1027.007 |
Dynamic API Resolution |
SI-02 |
Flaw Remediation |
Protects |
T1027.008 |
Stripped Payloads |
SI-03 |
Malicious Code Protection |
Protects |
T1027.008 |
Stripped Payloads |
SI-04 |
System Monitoring |
Protects |
T1027.008 |
Stripped Payloads |
SI-07 |
Software, Firmware, and Information Integrity |
Protects |
T1027.008 |
Stripped Payloads |
SI-02 |
Flaw Remediation |
Protects |
T1027.009 |
Embedded Payloads |
SI-03 |
Malicious Code Protection |
Protects |
T1027.009 |
Embedded Payloads |
SI-04 |
System Monitoring |
Protects |
T1027.009 |
Embedded Payloads |
SI-07 |
Software, Firmware, and Information Integrity |
Protects |
T1027.009 |
Embedded Payloads |
AC-04 |
Information Flow Enforcement |
Protects |
T1029 |
Scheduled Transfer |
CA-07 |
Continuous Monitoring |
Protects |
T1029 |
Scheduled Transfer |
CM-02 |
Baseline Configuration |
Protects |
T1029 |
Scheduled Transfer |
CM-06 |
Configuration Settings |
Protects |
T1029 |
Scheduled Transfer |
SC-07 |
Boundary Protection |
Protects |
T1029 |
Scheduled Transfer |
SI-03 |
Malicious Code Protection |
Protects |
T1029 |
Scheduled Transfer |
SI-04 |
System Monitoring |
Protects |
T1029 |
Scheduled Transfer |
AC-04 |
Information Flow Enforcement |
Protects |
T1030 |
Data Transfer Size Limits |
CA-07 |
Continuous Monitoring |
Protects |
T1030 |
Data Transfer Size Limits |
CM-02 |
Baseline Configuration |
Protects |
T1030 |
Data Transfer Size Limits |
CM-06 |
Configuration Settings |
Protects |
T1030 |
Data Transfer Size Limits |
SC-07 |
Boundary Protection |
Protects |
T1030 |
Data Transfer Size Limits |
SI-03 |
Malicious Code Protection |
Protects |
T1030 |
Data Transfer Size Limits |
SI-04 |
System Monitoring |
Protects |
T1030 |
Data Transfer Size Limits |
CM-02 |
Baseline Configuration |
Protects |
T1036.001 |
Invalid Code Signature |
CM-06 |
Configuration Settings |
Protects |
T1036.001 |
Invalid Code Signature |
IA-09 |
Service Identification and Authentication |
Protects |
T1036.001 |
Invalid Code Signature |
SI-04 |
System Monitoring |
Protects |
T1036.001 |
Invalid Code Signature |
SI-07 |
Software, Firmware, and Information Integrity |
Protects |
T1036.001 |
Invalid Code Signature |
AC-02 |
Account Management |
Protects |
T1036.003 |
Rename System Utilities |
AC-03 |
Access Enforcement |
Protects |
T1036.003 |
Rename System Utilities |
AC-06 |
Least Privilege |
Protects |
T1036.003 |
Rename System Utilities |
CA-07 |
Continuous Monitoring |
Protects |
T1036.003 |
Rename System Utilities |
CM-02 |
Baseline Configuration |
Protects |
T1036.003 |
Rename System Utilities |
CM-06 |
Configuration Settings |
Protects |
T1036.003 |
Rename System Utilities |
SI-03 |
Malicious Code Protection |
Protects |
T1036.003 |
Rename System Utilities |
SI-04 |
System Monitoring |
Protects |
T1036.003 |
Rename System Utilities |
CA-07 |
Continuous Monitoring |
Protects |
T1036.007 |
Double File Extension |
CM-02 |
Baseline Configuration |
Protects |
T1036.007 |
Double File Extension |
CM-06 |
Configuration Settings |
Protects |
T1036.007 |
Double File Extension |
CM-07 |
Least Functionality |
Protects |
T1036.007 |
Double File Extension |
IA-02 |
Identification and Authentication (organizational Users) |
Protects |
T1036.007 |
Double File Extension |
SI-04 |
System Monitoring |
Protects |
T1036.007 |
Double File Extension |
AC-17 |
Remote Access |
Protects |
T1037.001 |
Logon Script (Windows) |
CM-07 |
Least Functionality |
Protects |
T1037.001 |
Logon Script (Windows) |
AC-03 |
Access Enforcement |
Protects |
T1037.002 |
Login Hook |
CM-02 |
Baseline Configuration |
Protects |
T1037.002 |
Login Hook |
SI-03 |
Malicious Code Protection |
Protects |
T1037.002 |
Login Hook |
SI-04 |
System Monitoring |
Protects |
T1037.002 |
Login Hook |
SI-07 |
Software, Firmware, and Information Integrity |
Protects |
T1037.002 |
Login Hook |
CM-06 |
Configuration Settings |
Protects |
T1037.002 |
Login Hook |
CA-07 |
Continuous Monitoring |
Protects |
T1037.002 |
Login Hook |
AC-03 |
Access Enforcement |
Protects |
T1037.003 |
Network Logon Script |
CA-07 |
Continuous Monitoring |
Protects |
T1037.003 |
Network Logon Script |
CM-02 |
Baseline Configuration |
Protects |
T1037.003 |
Network Logon Script |
CM-06 |
Configuration Settings |
Protects |
T1037.003 |
Network Logon Script |
SI-03 |
Malicious Code Protection |
Protects |
T1037.003 |
Network Logon Script |
SI-04 |
System Monitoring |
Protects |
T1037.003 |
Network Logon Script |
SI-07 |
Software, Firmware, and Information Integrity |
Protects |
T1037.003 |
Network Logon Script |
AC-03 |
Access Enforcement |
Protects |
T1037.004 |
RC Scripts |
CA-07 |
Continuous Monitoring |
Protects |
T1037.004 |
RC Scripts |
CM-02 |
Baseline Configuration |
Protects |
T1037.004 |
RC Scripts |
CM-06 |
Configuration Settings |
Protects |
T1037.004 |
RC Scripts |
SI-03 |
Malicious Code Protection |
Protects |
T1037.004 |
RC Scripts |
SI-04 |
System Monitoring |
Protects |
T1037.004 |
RC Scripts |
SI-07 |
Software, Firmware, and Information Integrity |
Protects |
T1037.004 |
RC Scripts |
AC-03 |
Access Enforcement |
Protects |
T1037.005 |
Startup Items |
CA-07 |
Continuous Monitoring |
Protects |
T1037.005 |
Startup Items |
CM-02 |
Baseline Configuration |
Protects |
T1037.005 |
Startup Items |
CM-06 |
Configuration Settings |
Protects |
T1037.005 |
Startup Items |
SI-03 |
Malicious Code Protection |
Protects |
T1037.005 |
Startup Items |
SI-04 |
System Monitoring |
Protects |
T1037.005 |
Startup Items |
SI-07 |
Software, Firmware, and Information Integrity |
Protects |
T1037.005 |
Startup Items |
AC-03 |
Access Enforcement |
Protects |
T1048.001 |
Exfiltration Over Symmetric Encrypted Non-C2 Protocol |
AC-04 |
Information Flow Enforcement |
Protects |
T1048.001 |
Exfiltration Over Symmetric Encrypted Non-C2 Protocol |
CA-07 |
Continuous Monitoring |
Protects |
T1048.001 |
Exfiltration Over Symmetric Encrypted Non-C2 Protocol |
CM-02 |
Baseline Configuration |
Protects |
T1048.001 |
Exfiltration Over Symmetric Encrypted Non-C2 Protocol |
CM-06 |
Configuration Settings |
Protects |
T1048.001 |
Exfiltration Over Symmetric Encrypted Non-C2 Protocol |
CM-07 |
Least Functionality |
Protects |
T1048.001 |
Exfiltration Over Symmetric Encrypted Non-C2 Protocol |
SC-46 |
Cross Domain Policy Enforcement |
Protects |
T1048.001 |
Exfiltration Over Symmetric Encrypted Non-C2 Protocol |
SC-07 |
Boundary Protection |
Protects |
T1048.001 |
Exfiltration Over Symmetric Encrypted Non-C2 Protocol |
SI-10 |
Information Input Validation |
Protects |
T1048.001 |
Exfiltration Over Symmetric Encrypted Non-C2 Protocol |
SI-15 |
Information Output Filtering |
Protects |
T1048.001 |
Exfiltration Over Symmetric Encrypted Non-C2 Protocol |
SI-03 |
Malicious Code Protection |
Protects |
T1048.001 |
Exfiltration Over Symmetric Encrypted Non-C2 Protocol |
SI-04 |
System Monitoring |
Protects |
T1048.001 |
Exfiltration Over Symmetric Encrypted Non-C2 Protocol |
AC-16 |
Security and Privacy Attributes |
Protects |
T1048.002 |
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
AC-02 |
Account Management |
Protects |
T1048.002 |
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
AC-20 |
Use of External Systems |
Protects |
T1048.002 |
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
AC-23 |
Data Mining Protection |
Protects |
T1048.002 |
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
AC-03 |
Access Enforcement |
Protects |
T1048.002 |
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
AC-04 |
Information Flow Enforcement |
Protects |
T1048.002 |
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
AC-06 |
Least Privilege |
Protects |
T1048.002 |
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
CA-03 |
Information Exchange |
Protects |
T1048.002 |
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
CA-07 |
Continuous Monitoring |
Protects |
T1048.002 |
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
CM-02 |
Baseline Configuration |
Protects |
T1048.002 |
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
CM-06 |
Configuration Settings |
Protects |
T1048.002 |
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
CM-07 |
Least Functionality |
Protects |
T1048.002 |
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
SA-08 |
Security and Privacy Engineering Principles |
Protects |
T1048.002 |
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
SA-09 |
External System Services |
Protects |
T1048.002 |
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
SC-28 |
Protection of Information at Rest |
Protects |
T1048.002 |
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
SC-31 |
Covert Channel Analysis |
Protects |
T1048.002 |
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
SC-46 |
Cross Domain Policy Enforcement |
Protects |
T1048.002 |
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
SC-07 |
Boundary Protection |
Protects |
T1048.002 |
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
SI-10 |
Information Input Validation |
Protects |
T1048.002 |
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
SI-15 |
Information Output Filtering |
Protects |
T1048.002 |
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
SI-03 |
Malicious Code Protection |
Protects |
T1048.002 |
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
SI-04 |
System Monitoring |
Protects |
T1048.002 |
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
SR-04 |
Provenance |
Protects |
T1048.002 |
Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
AC-16 |
Security and Privacy Attributes |
Protects |
T1052 |
Exfiltration Over Physical Medium |
AC-02 |
Account Management |
Protects |
T1052 |
Exfiltration Over Physical Medium |
AC-20 |
Use of External Systems |
Protects |
T1052 |
Exfiltration Over Physical Medium |
AC-23 |
Data Mining Protection |
Protects |
T1052 |
Exfiltration Over Physical Medium |
AC-03 |
Access Enforcement |
Protects |
T1052 |
Exfiltration Over Physical Medium |
AC-06 |
Least Privilege |
Protects |
T1052 |
Exfiltration Over Physical Medium |
CA-07 |
Continuous Monitoring |
Protects |
T1052 |
Exfiltration Over Physical Medium |
CM-02 |
Baseline Configuration |
Protects |
T1052 |
Exfiltration Over Physical Medium |
CM-06 |
Configuration Settings |
Protects |
T1052 |
Exfiltration Over Physical Medium |
CM-07 |
Least Functionality |
Protects |
T1052 |
Exfiltration Over Physical Medium |
CM-08 |
System Component Inventory |
Protects |
T1052 |
Exfiltration Over Physical Medium |
MP-07 |
Media Use |
Protects |
T1052 |
Exfiltration Over Physical Medium |
RA-05 |
Vulnerability Monitoring and Scanning |
Protects |
T1052 |
Exfiltration Over Physical Medium |
SA-08 |
Security and Privacy Engineering Principles |
Protects |
T1052 |
Exfiltration Over Physical Medium |
SC-28 |
Protection of Information at Rest |
Protects |
T1052 |
Exfiltration Over Physical Medium |
SC-41 |
Port and I/O Device Access |
Protects |
T1052 |
Exfiltration Over Physical Medium |
SI-03 |
Malicious Code Protection |
Protects |
T1052 |
Exfiltration Over Physical Medium |
SI-04 |
System Monitoring |
Protects |
T1052 |
Exfiltration Over Physical Medium |
SR-04 |
Provenance |
Protects |
T1052 |
Exfiltration Over Physical Medium |
AC-16 |
Security and Privacy Attributes |
Protects |
T1052.001 |
Exfiltration over USB |
AC-02 |
Account Management |
Protects |
T1052.001 |
Exfiltration over USB |
AC-20 |
Use of External Systems |
Protects |
T1052.001 |
Exfiltration over USB |
AC-23 |
Data Mining Protection |
Protects |
T1052.001 |
Exfiltration over USB |
AC-03 |
Access Enforcement |
Protects |
T1052.001 |
Exfiltration over USB |
AC-06 |
Least Privilege |
Protects |
T1052.001 |
Exfiltration over USB |
CA-07 |
Continuous Monitoring |
Protects |
T1052.001 |
Exfiltration over USB |
CM-02 |
Baseline Configuration |
Protects |
T1052.001 |
Exfiltration over USB |
CM-06 |
Configuration Settings |
Protects |
T1052.001 |
Exfiltration over USB |
CM-07 |
Least Functionality |
Protects |
T1052.001 |
Exfiltration over USB |
CM-08 |
System Component Inventory |
Protects |
T1052.001 |
Exfiltration over USB |
MP-07 |
Media Use |
Protects |
T1052.001 |
Exfiltration over USB |
RA-05 |
Vulnerability Monitoring and Scanning |
Protects |
T1052.001 |
Exfiltration over USB |
SA-08 |
Security and Privacy Engineering Principles |
Protects |
T1052.001 |
Exfiltration over USB |
SC-28 |
Protection of Information at Rest |
Protects |
T1052.001 |
Exfiltration over USB |
SC-41 |
Port and I/O Device Access |
Protects |
T1052.001 |
Exfiltration over USB |
SI-03 |
Malicious Code Protection |
Protects |
T1052.001 |
Exfiltration over USB |
SI-04 |
System Monitoring |
Protects |
T1052.001 |
Exfiltration over USB |
SR-04 |
Provenance |
Protects |
T1052.001 |
Exfiltration over USB |
AC-02 |
Account Management |
Protects |
T1053.003 |
Cron |
AC-03 |
Access Enforcement |
Protects |
T1053.003 |
Cron |
AC-05 |
Separation of Duties |
Protects |
T1053.003 |
Cron |
AC-06 |
Least Privilege |
Protects |
T1053.003 |
Cron |
CA-08 |
Penetration Testing |
Protects |
T1053.003 |
Cron |
CM-05 |
Access Restrictions for Change |
Protects |
T1053.003 |
Cron |
IA-02 |
Identification and Authentication (organizational Users) |
Protects |
T1053.003 |
Cron |
RA-05 |
Vulnerability Monitoring and Scanning |
Protects |
T1053.003 |
Cron |
SI-04 |
System Monitoring |
Protects |
T1053.003 |
Cron |
AC-02 |
Account Management |
Protects |
T1053.007 |
Container Orchestration Job |
AC-03 |
Access Enforcement |
Protects |
T1053.007 |
Container Orchestration Job |
AC-05 |
Separation of Duties |
Protects |
T1053.007 |
Container Orchestration Job |
AC-06 |
Least Privilege |
Protects |
T1053.007 |
Container Orchestration Job |
CM-05 |
Access Restrictions for Change |
Protects |
T1053.007 |
Container Orchestration Job |
IA-02 |
Identification and Authentication (organizational Users) |
Protects |
T1053.007 |
Container Orchestration Job |
IA-08 |
Identification and Authentication (non-organizational Users) |
Protects |
T1053.007 |
Container Orchestration Job |
AC-02 |
Account Management |
Protects |
T1055 |
Process Injection |
AC-03 |
Access Enforcement |
Protects |
T1055 |
Process Injection |
AC-05 |
Separation of Duties |
Protects |
T1055 |
Process Injection |
AC-06 |
Least Privilege |
Protects |
T1055 |
Process Injection |
CM-05 |
Access Restrictions for Change |
Protects |
T1055 |
Process Injection |
CM-06 |
Configuration Settings |
Protects |
T1055 |
Process Injection |
IA-02 |
Identification and Authentication (organizational Users) |
Protects |
T1055 |
Process Injection |
SC-18 |
Mobile Code |
Protects |
T1055 |
Process Injection |
SC-07 |
Boundary Protection |
Protects |
T1055 |
Process Injection |
SI-02 |
Flaw Remediation |
Protects |
T1055 |
Process Injection |
SI-03 |
Malicious Code Protection |
Protects |
T1055 |
Process Injection |
SI-04 |
System Monitoring |
Protects |
T1055 |
Process Injection |
AC-06 |
Least Privilege |
Protects |
T1055.001 |
Dynamic-link Library Injection |
SC-18 |
Mobile Code |
Protects |
T1055.001 |
Dynamic-link Library Injection |
SC-07 |
Boundary Protection |
Protects |
T1055.001 |
Dynamic-link Library Injection |
SI-02 |
Flaw Remediation |
Protects |
T1055.001 |
Dynamic-link Library Injection |
SI-03 |
Malicious Code Protection |
Protects |
T1055.001 |
Dynamic-link Library Injection |
SI-04 |
System Monitoring |
Protects |
T1055.001 |
Dynamic-link Library Injection |
AC-06 |
Least Privilege |
Protects |
T1055.002 |
Portable Executable Injection |
SC-18 |
Mobile Code |
Protects |
T1055.002 |
Portable Executable Injection |
SC-07 |
Boundary Protection |
Protects |
T1055.002 |
Portable Executable Injection |
SI-02 |
Flaw Remediation |
Protects |
T1055.002 |
Portable Executable Injection |
SI-03 |
Malicious Code Protection |
Protects |
T1055.002 |
Portable Executable Injection |
SI-04 |
System Monitoring |
Protects |
T1055.002 |
Portable Executable Injection |
AC-06 |
Least Privilege |
Protects |
T1055.003 |
Thread Execution Hijacking |
SC-18 |
Mobile Code |
Protects |
T1055.003 |
Thread Execution Hijacking |
SC-07 |
Boundary Protection |
Protects |
T1055.003 |
Thread Execution Hijacking |
SI-02 |
Flaw Remediation |
Protects |
T1055.003 |
Thread Execution Hijacking |
SI-03 |
Malicious Code Protection |
Protects |
T1055.003 |
Thread Execution Hijacking |
SI-04 |
System Monitoring |
Protects |
T1055.003 |
Thread Execution Hijacking |
AC-06 |
Least Privilege |
Protects |
T1055.004 |
Asynchronous Procedure Call |
SC-18 |
Mobile Code |
Protects |
T1055.004 |
Asynchronous Procedure Call |
SC-07 |
Boundary Protection |
Protects |
T1055.004 |
Asynchronous Procedure Call |
SI-02 |
Flaw Remediation |
Protects |
T1055.004 |
Asynchronous Procedure Call |
SI-03 |
Malicious Code Protection |
Protects |
T1055.004 |
Asynchronous Procedure Call |
SI-04 |
System Monitoring |
Protects |
T1055.004 |
Asynchronous Procedure Call |
AC-06 |
Least Privilege |
Protects |
T1055.005 |
Thread Local Storage |
SC-18 |
Mobile Code |
Protects |
T1055.005 |
Thread Local Storage |
SC-07 |
Boundary Protection |
Protects |
T1055.005 |
Thread Local Storage |
SI-02 |
Flaw Remediation |
Protects |
T1055.005 |
Thread Local Storage |
SI-03 |
Malicious Code Protection |
Protects |
T1055.005 |
Thread Local Storage |
SI-04 |
System Monitoring |
Protects |
T1055.005 |
Thread Local Storage |
AC-02 |
Account Management |
Protects |
T1055.008 |
Ptrace System Calls |
AC-03 |
Access Enforcement |
Protects |
T1055.008 |
Ptrace System Calls |
AC-05 |
Separation of Duties |
Protects |
T1055.008 |
Ptrace System Calls |
AC-06 |
Least Privilege |
Protects |
T1055.008 |
Ptrace System Calls |
CM-05 |
Access Restrictions for Change |
Protects |
T1055.008 |
Ptrace System Calls |
CM-06 |
Configuration Settings |
Protects |
T1055.008 |
Ptrace System Calls |
IA-02 |
Identification and Authentication (organizational Users) |
Protects |
T1055.008 |
Ptrace System Calls |
SC-18 |
Mobile Code |
Protects |
T1055.008 |
Ptrace System Calls |
SC-07 |
Boundary Protection |
Protects |
T1055.008 |
Ptrace System Calls |
SI-02 |
Flaw Remediation |
Protects |
T1055.008 |
Ptrace System Calls |
SI-03 |
Malicious Code Protection |
Protects |
T1055.008 |
Ptrace System Calls |
SI-04 |
System Monitoring |
Protects |
T1055.008 |
Ptrace System Calls |
AC-03 |
Access Enforcement |
Protects |
T1055.009 |
Proc Memory |
AC-06 |
Least Privilege |
Protects |
T1055.009 |
Proc Memory |
CA-07 |
Continuous Monitoring |
Protects |
T1055.009 |
Proc Memory |
SC-18 |
Mobile Code |
Protects |
T1055.009 |
Proc Memory |
SC-07 |
Boundary Protection |
Protects |
T1055.009 |
Proc Memory |
SI-16 |
Memory Protection |
Protects |
T1055.009 |
Proc Memory |
SI-02 |
Flaw Remediation |
Protects |
T1055.009 |
Proc Memory |
SI-03 |
Malicious Code Protection |
Protects |
T1055.009 |
Proc Memory |
SI-04 |
System Monitoring |
Protects |
T1055.009 |
Proc Memory |
AC-06 |
Least Privilege |
Protects |
T1055.011 |
Extra Window Memory Injection |
SC-18 |
Mobile Code |
Protects |
T1055.011 |
Extra Window Memory Injection |
SC-07 |
Boundary Protection |
Protects |
T1055.011 |
Extra Window Memory Injection |
SI-02 |
Flaw Remediation |
Protects |
T1055.011 |
Extra Window Memory Injection |
SI-03 |
Malicious Code Protection |
Protects |
T1055.011 |
Extra Window Memory Injection |
SI-04 |
System Monitoring |
Protects |
T1055.011 |
Extra Window Memory Injection |
AC-06 |
Least Privilege |
Protects |
T1055.013 |
Process Doppelgänging |
SC-18 |
Mobile Code |
Protects |
T1055.013 |
Process Doppelgänging |
SC-07 |
Boundary Protection |
Protects |
T1055.013 |
Process Doppelgänging |
SI-02 |
Flaw Remediation |
Protects |
T1055.013 |
Process Doppelgänging |
SI-03 |
Malicious Code Protection |
Protects |
T1055.013 |
Process Doppelgänging |
SI-04 |
System Monitoring |
Protects |
T1055.013 |
Process Doppelgänging |
AC-06 |
Least Privilege |
Protects |
T1055.014 |
VDSO Hijacking |
SC-18 |
Mobile Code |
Protects |
T1055.014 |
VDSO Hijacking |
SC-07 |
Boundary Protection |
Protects |
T1055.014 |
VDSO Hijacking |
SI-02 |
Flaw Remediation |
Protects |
T1055.014 |
VDSO Hijacking |
SI-03 |
Malicious Code Protection |
Protects |
T1055.014 |
VDSO Hijacking |
SI-04 |
System Monitoring |
Protects |
T1055.014 |
VDSO Hijacking |
SI-03 |
Malicious Code Protection |
Protects |
T1055.015 |
ListPlanting |
CA-07 |
Continuous Monitoring |
Protects |
T1056.002 |
GUI Input Capture |
SI-03 |
Malicious Code Protection |
Protects |
T1056.002 |
GUI Input Capture |
SI-04 |
System Monitoring |
Protects |
T1056.002 |
GUI Input Capture |
SI-07 |
Software, Firmware, and Information Integrity |
Protects |
T1056.002 |
GUI Input Capture |
AC-02 |
Account Management |
Protects |
T1056.003 |
Web Portal Capture |
AC-03 |
Access Enforcement |
Protects |
T1056.003 |
Web Portal Capture |
AC-05 |
Separation of Duties |
Protects |
T1056.003 |
Web Portal Capture |
AC-06 |
Least Privilege |
Protects |
T1056.003 |
Web Portal Capture |
CM-05 |
Access Restrictions for Change |
Protects |
T1056.003 |
Web Portal Capture |
CM-06 |
Configuration Settings |
Protects |
T1056.003 |
Web Portal Capture |
IA-02 |
Identification and Authentication (organizational Users) |
Protects |
T1056.003 |
Web Portal Capture |
AC-17 |
Remote Access |
Protects |
T1059 |
Command and Scripting Interpreter |
AC-02 |
Account Management |
Protects |
T1059 |
Command and Scripting Interpreter |
AC-03 |
Access Enforcement |
Protects |
T1059 |
Command and Scripting Interpreter |
AC-05 |
Separation of Duties |
Protects |
T1059 |
Command and Scripting Interpreter |
AC-06 |
Least Privilege |
Protects |
T1059 |
Command and Scripting Interpreter |
CA-07 |
Continuous Monitoring |
Protects |
T1059 |
Command and Scripting Interpreter |
CA-08 |
Penetration Testing |
Protects |
T1059 |
Command and Scripting Interpreter |
CM-11 |
User-installed Software |
Protects |
T1059 |
Command and Scripting Interpreter |
CM-02 |
Baseline Configuration |
Protects |
T1059 |
Command and Scripting Interpreter |
CM-05 |
Access Restrictions for Change |
Protects |
T1059 |
Command and Scripting Interpreter |
CM-06 |
Configuration Settings |
Protects |
T1059 |
Command and Scripting Interpreter |
CM-07 |
Least Functionality |
Protects |
T1059 |
Command and Scripting Interpreter |
CM-08 |
System Component Inventory |
Protects |
T1059 |
Command and Scripting Interpreter |
IA-02 |
Identification and Authentication (organizational Users) |
Protects |
T1059 |
Command and Scripting Interpreter |
IA-08 |
Identification and Authentication (non-organizational Users) |
Protects |
T1059 |
Command and Scripting Interpreter |
IA-09 |
Service Identification and Authentication |
Protects |
T1059 |
Command and Scripting Interpreter |
RA-05 |
Vulnerability Monitoring and Scanning |
Protects |
T1059 |
Command and Scripting Interpreter |
SC-18 |
Mobile Code |
Protects |
T1059 |
Command and Scripting Interpreter |
SI-10 |
Information Input Validation |
Protects |
T1059 |
Command and Scripting Interpreter |
SI-16 |
Memory Protection |
Protects |
T1059 |
Command and Scripting Interpreter |
SI-02 |
Flaw Remediation |
Protects |
T1059 |
Command and Scripting Interpreter |
SI-03 |
Malicious Code Protection |
Protects |
T1059 |
Command and Scripting Interpreter |
SI-04 |
System Monitoring |
Protects |
T1059 |
Command and Scripting Interpreter |
SI-07 |
Software, Firmware, and Information Integrity |
Protects |
T1059 |
Command and Scripting Interpreter |
AC-17 |
Remote Access |
Protects |
T1059.001 |
PowerShell |
AC-02 |
Account Management |
Protects |
T1059.001 |
PowerShell |
AC-03 |
Access Enforcement |
Protects |
T1059.001 |
PowerShell |
AC-05 |
Separation of Duties |
Protects |
T1059.001 |
PowerShell |
AC-06 |
Least Privilege |
Protects |
T1059.001 |
PowerShell |
CM-02 |
Baseline Configuration |
Protects |
T1059.001 |
PowerShell |