NIST 800-53 SR-11 Mappings

Sources of counterfeit components include manufacturers, developers, vendors, and contractors. Anti-counterfeiting policies and procedures support tamper resistance and provide a level of protection against the introduction of malicious code. External reporting organizations include CISA.

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name
SR-11 Component Authenticity Protects T1059.002 AppleScript
SR-11 Component Authenticity Protects T1204.003 Malicious Image
SR-11 Component Authenticity Protects T1505 Server Software Component
SR-11 Component Authenticity Protects T1505.001 SQL Stored Procedures
SR-11 Component Authenticity Protects T1505.002 Transport Agent
SR-11 Component Authenticity Protects T1505.004 IIS Components
SR-11 Component Authenticity Protects T1546.006 LC_LOAD_DYLIB Addition
SR-11 Component Authenticity Protects T1554 Compromise Client Software Binary
SR-11 Component Authenticity Protects T1601 Modify System Image
SR-11 Component Authenticity Protects T1601.001 Patch System Image
SR-11 Component Authenticity Protects T1601.002 Downgrade System Image