NIST 800-53 SC-46 Mappings

For logical policy enforcement mechanisms, organizations avoid creating a logical path between interfaces to prevent the ability to bypass the policy enforcement mechanism. For physical policy enforcement mechanisms, the robustness of physical isolation afforded by the physical implementation of policy enforcement to preclude the presence of logical covert channels penetrating the security domain may be needed. Contact ncdsmo@nsa.gov for more information.

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name
SC-46 Cross Domain Policy Enforcement Protects T1021.001 Remote Desktop Protocol
SC-46 Cross Domain Policy Enforcement Protects T1021.003 Distributed Component Object Model
SC-46 Cross Domain Policy Enforcement Protects T1021.006 Windows Remote Management
SC-46 Cross Domain Policy Enforcement Protects T1046 Network Service Scanning
SC-46 Cross Domain Policy Enforcement Protects T1048 Exfiltration Over Alternative Protocol
SC-46 Cross Domain Policy Enforcement Protects T1048.001 Exfiltration Over Symmetric Encrypted Non-C2 Protocol
SC-46 Cross Domain Policy Enforcement Protects T1048.002 Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
SC-46 Cross Domain Policy Enforcement Protects T1048.003 Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol
SC-46 Cross Domain Policy Enforcement Protects T1072 Software Deployment Tools
SC-46 Cross Domain Policy Enforcement Protects T1098 Account Manipulation
SC-46 Cross Domain Policy Enforcement Protects T1098.001 Additional Cloud Credentials
SC-46 Cross Domain Policy Enforcement Protects T1133 External Remote Services
SC-46 Cross Domain Policy Enforcement Protects T1136 Create Account
SC-46 Cross Domain Policy Enforcement Protects T1136.002 Domain Account
SC-46 Cross Domain Policy Enforcement Protects T1136.003 Cloud Account
SC-46 Cross Domain Policy Enforcement Protects T1190 Exploit Public-Facing Application
SC-46 Cross Domain Policy Enforcement Protects T1199 Trusted Relationship
SC-46 Cross Domain Policy Enforcement Protects T1210 Exploitation of Remote Services
SC-46 Cross Domain Policy Enforcement Protects T1482 Domain Trust Discovery
SC-46 Cross Domain Policy Enforcement Protects T1489 Service Stop
SC-46 Cross Domain Policy Enforcement Protects T1557 Man-in-the-Middle
SC-46 Cross Domain Policy Enforcement Protects T1557.001 LLMNR/NBT-NS Poisoning and SMB Relay
SC-46 Cross Domain Policy Enforcement Protects T1563 Remote Service Session Hijacking
SC-46 Cross Domain Policy Enforcement Protects T1563.002 RDP Hijacking
SC-46 Cross Domain Policy Enforcement Protects T1565 Data Manipulation
SC-46 Cross Domain Policy Enforcement Protects T1565.003 Runtime Data Manipulation