NIST 800-53 SI-8 Mappings

System entry and exit points include firewalls, remote-access servers, electronic mail servers, web servers, proxy servers, workstations, notebook computers, and mobile devices. Spam can be transported by different means, including email, email attachments, and web accesses. Spam protection mechanisms include signature definitions.

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name
SI-8 Spam Protection Protects T1221 Template Injection
SI-8 Spam Protection Protects T1137 Office Application Startup
SI-8 Spam Protection Protects T1137.001 Office Template Macros
SI-8 Spam Protection Protects T1137.002 Office Test
SI-8 Spam Protection Protects T1137.003 Outlook Forms
SI-8 Spam Protection Protects T1137.004 Outlook Home Page
SI-8 Spam Protection Protects T1137.005 Outlook Rules
SI-8 Spam Protection Protects T1137.006 Add-ins
SI-8 Spam Protection Protects T1204.001 Malicious Link
SI-8 Spam Protection Protects T1204.003 Malicious Image
SI-8 Spam Protection Protects T1566 Phishing
SI-8 Spam Protection Protects T1566.001 Spearphishing Attachment
SI-8 Spam Protection Protects T1566.003 Spearphishing via Service
SI-8 Spam Protection Protects T1598 Phishing for Information
SI-8 Spam Protection Protects T1598.001 Spearphishing Service
SI-8 Spam Protection Protects T1598.002 Spearphishing Attachment
SI-8 Spam Protection Protects T1566.002 Spearphishing Link
SI-8 Spam Protection Protects T1598.003 Spearphishing Link
SI-8 Spam Protection Protects T1204 User Execution
SI-8 Spam Protection Protects T1204.002 Malicious File