General
- M3.3.3 - P2 - TRAINING EXECUTION
- M4.4.3 - P1 - REMOVAL OF ACCES RIGHTS
- T1.4.1 - P1 - MANAGEMENT OF REMOVABLE MEDIA
- T3.4.1 - P1 - CONTROLS AGAINST MALWARE
- T3.4.2;
- T3.6.2 - P2 - AUDIT LOGGING
- T3.6.3 - P1 - MONITORING SYSTEM USE
- T3.6.4 - P2 - PROTECTION OF LOG INFORMATION
- T4.5.1 - P1 - NETWORK CONTROLS
- T4.5.3 - P1 - SEGREGATION IN NETWORK
- T5.2.1 - P1 - USER REGISTRATION
- T5.2.2 - P1 - PRIVILEGE MANAGEMENT
- T5.2.3 - P1 - USER SECURITY CREDENTIALS MANAGEMENT
- T5.2.4 - P1- REVIEW OF USER ACCESS RIGHTS
- T5.3.1 - P1 - USE OF SECURITY CREDENTIALS
- T5.4.4 - P4 - REMOTE DIAGNOSTIC AND CONFIGURATION PROTECTION
- T5.4.6 - P3 - NETWORK ROUTING CONTROL
- T5.5.1 - P1 - SECURE LOG-ON PROCEDURES
- T5.5.2 - P1 - USER IDENTIFICATION AND AUTHENTICATION
- T5.5.3 - P1 - USER CREDENTIALS MANAGEMENT SYSTEM
- T5.6.1 - P1 - INFORMATION ACCESS RESTRICTION
- T7.7.1 - P1 - CONTROL OF TECHNICAL VULNERABILITIES
Send Data to External Site/Entity
- T1.4.1 - P1 - MANAGEMENT OF REMOVABLE MEDIA
- T4.5.1 - P1 - NETWORK CONTROLS
- T5.4.2 - P1 -USER AUTHENTICATION FOR EXTERNAL CONNECTIONS
- T5.4.5 - P1- NETWORK CONNECTION CONTROL
- T5.5.1 - P1 - SECURE LOG-ON PROCEDURES
- T5.5.2 - P1 - USER IDENTIFICATION AND AUTHENTICATION
- T5.5.3 - P1 - USER CREDENTIALS MANAGEMENT SYSTEM
- T6.2.1 - P2 - SERVICE DELIVERY
- T6.2.2 - P2 -MONITORING AND REVIEW OF THIRD PARTY SERVICES
- T6.2.3 - P2 - MANAGING CHANGES TO THIRD PARTY SERVICES
- T6.3.1 - P2 - INFORMATION SECURITY REQUIREMENTS FOR CLOUD ENVIRONMENTS
- T6.3.2 - P2 - SERVICE DELIVERY AGREEMENTS WITH CLOUD PROVIDERS
Backdoor or Command and Control
- M4.4.3 - P1 - REMOVAL OF ACCES RIGHTS
- T1.4.1 - P1 - MANAGEMENT OF REMOVABLE MEDIA
- T1.4.2 - P2 - DISPOSAL OF MEDIA
- T3.4.1 - P1 - CONTROLS AGAINST MALWARE
- T3.4.2;
- T3.5.1 - P1 - INFORMATION BACKUP
- T3.6.2 - P2 - AUDIT LOGGING
- T3.6.3 - P1 - MONITORING SYSTEM USE
- T3.6.4 - P2 - PROTECTION OF LOG INFORMATION
- T3.6.5 - P2 - ADMINISTRATOR AND OPERATOR LOGS
- T4.5.1 - P1 - NETWORK CONTROLS
- T4.5.2 - P2 - SECURITY OF NETWORK SERVICES
- T4.5.3 - P1 - SEGREGATION IN NETWORK
- T4.5.4 - P2 - SECURITY OF WIRELESS NETWORKS
- T5.2.1 - P1 - USER REGISTRATION
- T5.2.2 - P1 - PRIVILEGE MANAGEMENT
- T5.2.3 - P1 - USER SECURITY CREDENTIALS MANAGEMENT
- T5.2.4 - P1- REVIEW OF USER ACCESS RIGHTS
- T5.3.1 - P1 - USE OF SECURITY CREDENTIALS
- T5.4.2 - P1 -USER AUTHENTICATION FOR EXTERNAL CONNECTIONS
- T5.4.3 - P1 - EQUIPMENT INDENTIFICATION NETWORKS
- T5.4.5 - P1- NETWORK CONNECTION CONTROL
- T5.4.7 - P2 - WIRELESS ACCESS
- T5.5.1 - P1 - SECURE LOG-ON PROCEDURES
- T5.5.2 - P1 - USER IDENTIFICATION AND AUTHENTICATION
- T5.5.3 - P1 - USER CREDENTIALS MANAGEMENT SYSTEM
- T5.6.1 - P1 - INFORMATION ACCESS RESTRICTION
- T5.6.2 - P2 - SENSITIVE SYSTEM ISOLATION
- T7.7.1 - P1 - CONTROL OF TECHNICAL VULNERABILITIES
Disable or interfere with security controls
- T2.2.1 - P2 - PHYSICAL SECURITY PERIMETER
- T2.2.2 - P2 - PHYSICAL ENTRY CONTROLS
- T2.2.3 - P2 - SECURING OFFICES, ROOMS AND FACILITIES
- T2.2.5 - P3 - WORKING IN SECURE AREAS
- T2.2.6 - P3 - PUBLIC ACCESS, DELIVERY AND LOADING AREAS
- T2.3.8 - P2 - UNATTENDED USER EQUIPMENT
- T3.4.1 - P1 - CONTROLS AGAINST MALWARE
- T3.4.2;
- T3.6.2 - P2 - AUDIT LOGGING
- T5.2.3 - P1 - USER SECURITY CREDENTIALS MANAGEMENT
- T5.2.4 - P1- REVIEW OF USER ACCESS RIGHTS
- T5.3.1 - P1 - USE OF SECURITY CREDENTIALS
- T5.4.2 - P1 -USER AUTHENTICATION FOR EXTERNAL CONNECTIONS
- T7.3.3 - P2 - MESSAGE INTEGRITY
- T7.6.2 - P3 - TECHNICAL REVIEW OF APPLICATIONS AFTER OPERATING SYSTEM CHANGES
- T7.6.3 - P2 - RESTRICTIONS ON CHANGES TO SOFTWARE PACKAGES
- T7.7.1 - P1 - CONTROL OF TECHNICAL VULNERABILITIES
System / Network Utilities
- T2.3.2 - P4 - SUPPORTING UTILITIES
- T3.4.1 - P1 - CONTROLS AGAINST MALWARE
- T3.4.2;
- T4.5.1 - P1 - NETWORK CONTROLS
- T4.5.2 - P2 - SECURITY OF NETWORK SERVICES
- T4.5.4 - P2 - SECURITY OF WIRELESS NETWORKS
- T5.4.7 - P2 - WIRELESS ACCESS
- T5.5.4 - P4 - USE OF SYSTEM UTILITIES
- T5.6.2 - P2 - SENSITIVE SYSTEM ISOLATION
RAM Scraper
- T2.3.9 - P3 - CLEAR DESK AND CLEAR SCREEN POLICY
- T3.4.1 - P1 - CONTROLS AGAINST MALWARE
- T3.4.2;
- T3.6.3 - P1 - MONITORING SYSTEM USE
- T3.6.4 - P2 - PROTECTION OF LOG INFORMATION
- T3.6.5 - P2 - ADMINISTRATOR AND OPERATOR LOGS
- T4.3.1 - P2 - ELETRONIC COMMERCE
- T4.3.2 - P3 - ON-LINE TRANSACTIONS
- T4.5.2 - P2 - SECURITY OF NETWORK SERVICES
- T5.4.2 - P1 -USER AUTHENTICATION FOR EXTERNAL CONNECTIONS
- T5.5.1 - P1 - SECURE LOG-ON PROCEDURES
- T5.5.2 - P1 - USER IDENTIFICATION AND AUTHENTICATION
- T7.4.1 - P2 - POLICY ON THE USE OF CRYPTOGRAPHIC CONTROLS
- T7.4.2 - P2 - KEY MANAGEMENT
- T7.6.4 - P2 - INFORMATION LEAKAGE
- T7.7.1 - P1 - CONTROL OF TECHNICAL VULNERABILITIES
Data from Untrustworthy Sources
- M3.3.3 - P2 - TRAINING EXECUTION
- M3.4.1 - P2 - AWARENESS CAMPAIGN
- T3.4.1 - P1 - CONTROLS AGAINST MALWARE
- M5.5.2 - P4 - PTOTECTION OF INFORMATION SYSTEMS AUDIT TOOL
Capture Data Resident on System
- T3.2.5 - P2 - SEPARATION OF DEVELOPMENT, TEST AND OPERATIONAL FACILITIES
- T3.4.1 - P1 - CONTROLS AGAINST MALWARE
- T3.4.2;
- T3.6.4 - P2 - PROTECTION OF LOG INFORMATION
- T5.4.3 - P1 - EQUIPMENT INDENTIFICATION NETWORKS
Download/Install additional Malware or Updates
- T1.4.1 - P1 - MANAGEMENT OF REMOVABLE MEDIA
- T3.4.1 - P1 - CONTROLS AGAINST MALWARE
- T3.4.2;
- T3.5.1 - P1 - INFORMATION BACKUP
- T5.2.1 - P1 - USER REGISTRATION
- T5.2.2 - P1 - PRIVILEGE MANAGEMENT
- T5.2.3 - P1 - USER SECURITY CREDENTIALS MANAGEMENT
- T5.2.4 - P1- REVIEW OF USER ACCESS RIGHTS
- T5.3.1 - P1 - USE OF SECURITY CREDENTIALS
- T7.5.3 - P3 - ACCESS CONTROL TO PROGRAM SOURCE CODE
- T7.6.3 - P2 - RESTRICTIONS ON CHANGES TO SOFTWARE PACKAGES
- T7.6.5 - P3 - OUTSOURCED SOFTWARE DEVELOPMENT