NIST CSF: ID.AM-1 Subcategory
From NIST's Cyber Security Framework (version 1):
Physical devices and systems within the organization are inventoried
Cyber Threat Graph Context
Explore how this control relates to the wider threat graph
CSF Mapped to SP800-53 Controls
Generated from NIST's SP800-53/CSF Crosswalk mappings.
Related ISO 27001 Controls
Annex A controls from ISO 27001 (2013) which are related to this CSF subcategory, taken from mappings by NIST and additional data from Ofgem.
-
Inventory of assets (8.1.1)
ISO 27001:2013 -
Ownership of assets (8.1.2)
ISO 27001:2013
Related ISA/IEC 62443 Controls
Clauses and controls from IEC 62443 (62443-2-1 and 62443-3-3) which are related to this CSF subcategory, taken from mappings by NIST and additional data from Ofgem.
-
Control system component inventory (SR 7.8)
ISA/IEC 62443-3-3:2013 -
Identify the industrial automation and control systems (4.2.3.4)
ISA/IEC 62443-2-1:2009
MITRE ATT&CK Techniques
See which MITRE ATT&CK techniques this control helps to protect against. This is based on mappings to associated SP800-53 controls.
ATT&CK ID | Title | Associated Tactics |
---|---|---|
T1221 | Template Injection | Defense Evasion |
T1548.004 | Elevated Execution with Prompt | Defense Evasion, Privilege Escalation |
T1098.004 | SSH Authorized Keys | Persistence, Privilege Escalation |
T1211 | Exploitation for Defense Evasion | Defense Evasion |
T1020.001 | Traffic Duplication | Exfiltration |
T1021.005 | VNC | Lateral Movement |
T1557.002 | ARP Cache Poisoning | Collection, Credential Access |
T1495 | Firmware Corruption | Impact |
T1021.006 | Windows Remote Management | Lateral Movement |
T1601.001 | Patch System Image | Defense Evasion |
T1542.004 | ROMMONkit | Defense Evasion, Persistence |
T1564.007 | VBA Stomping | Defense Evasion |
T1557.003 | DHCP Spoofing | Collection, Credential Access |
T1137.001 | Office Template Macros | Persistence |
T1542.001 | System Firmware | Defense Evasion, Persistence |
T1505 | Server Software Component | Persistence |
T1072 | Software Deployment Tools | Execution, Lateral Movement |
T1542 | Pre-OS Boot | Defense Evasion, Persistence |
T1547.007 | Re-opened Applications | Persistence, Privilege Escalation |
T1542.005 | TFTP Boot | Defense Evasion, Persistence |
T1218.009 | Regsvcs/Regasm | Defense Evasion |
T1195.003 | Compromise Hardware Supply Chain | Initial Access |
T1021.003 | Distributed Component Object Model | Lateral Movement |
T1559.002 | Dynamic Data Exchange | Execution |
T1602 | Data from Configuration Repository | Collection |
T1119 | Automated Collection | Collection |
T1218.012 | Verclsid | Defense Evasion |
T1059.007 | JavaScript | Execution |
T1091 | Replication Through Removable Media | Initial Access, Lateral Movement |
T1053.005 | Scheduled Task | Execution, Persistence, Privilege Escalation |
T1557.001 | LLMNR/NBT-NS Poisoning and SMB Relay | Collection, Credential Access |
T1218.004 | InstallUtil | Defense Evasion |
T1574.004 | Dylib Hijacking | Defense Evasion, Persistence, Privilege Escalation |
T1203 | Exploitation for Client Execution | Execution |
T1190 | Exploit Public-Facing Application | Initial Access |
T1563.001 | SSH Hijacking | Lateral Movement |
T1601 | Modify System Image | Defense Evasion |
T1059.005 | Visual Basic | Execution |
T1213.001 | Confluence | Collection |
T1505.002 | Transport Agent | Persistence |
T1218.013 | Mavinject | Defense Evasion |
T1213.002 | Sharepoint | Collection |
T1210 | Exploitation of Remote Services | Lateral Movement |
T1602.002 | Network Device Configuration Dump | Collection |
T1127 | Trusted Developer Utilities Proxy Execution | Defense Evasion |
T1553.006 | Code Signing Policy Modification | Defense Evasion |
T1059.001 | PowerShell | Execution |
T1546.002 | Screensaver | Persistence, Privilege Escalation |
T1564.006 | Run Virtual Instance | Defense Evasion |
T1059 | Command and Scripting Interpreter | Execution |
T1574.007 | Path Interception by PATH Environment Variable | Defense Evasion, Persistence, Privilege Escalation |
T1137 | Office Application Startup | Persistence |
T1505.004 | IIS Components | Persistence |
T1189 | Drive-by Compromise | Initial Access |
T1553 | Subvert Trust Controls | Defense Evasion |
T1602.001 | SNMP (MIB Dump) | Collection |
T1068 | Exploitation for Privilege Escalation | Privilege Escalation |
T1021.004 | SSH | Lateral Movement |
T1548 | Abuse Elevation Control Mechanism | Defense Evasion, Privilege Escalation |
T1218.008 | Odbcconf | Defense Evasion |
T1565.001 | Stored Data Manipulation | Impact |
T1218.014 | MMC | Defense Evasion |
T1218.005 | Mshta | Defense Evasion |
T1212 | Exploitation for Credential Access | Credential Access |
T1542.003 | Bootkit | Defense Evasion, Persistence |
T1574.009 | Path Interception by Unquoted Path | Defense Evasion, Persistence, Privilege Escalation |
T1546.006 | LC_LOAD_DYLIB Addition | Persistence, Privilege Escalation |
T1053.002 | At | Execution, Persistence, Privilege Escalation |
T1565 | Data Manipulation | Impact |
T1052 | Exfiltration Over Physical Medium | Exfiltration |
T1563 | Remote Service Session Hijacking | Lateral Movement |
T1574 | Hijack Execution Flow | Defense Evasion, Persistence, Privilege Escalation |
T1133 | External Remote Services | Initial Access, Persistence |
T1559 | Inter-Process Communication | Execution |
T1574.008 | Path Interception by Search Order Hijacking | Defense Evasion, Persistence, Privilege Escalation |
T1593.003 | Code Repositories | Reconnaissance |
T1557 | Adversary-in-the-Middle | Collection, Credential Access |
T1546.014 | Emond | Persistence, Privilege Escalation |
T1127.001 | MSBuild | Defense Evasion |
T1218 | System Binary Proxy Execution | Defense Evasion |
T1011.001 | Exfiltration Over Bluetooth | Exfiltration |
T1530 | Data from Cloud Storage | Collection |
T1601.002 | Downgrade System Image | Defense Evasion |
T1053 | Scheduled Task/Job | Execution, Persistence, Privilege Escalation |
T1565.002 | Transmitted Data Manipulation | Impact |
T1622 | Debugger Evasion | Defense Evasion, Discovery |
T1213 | Data from Information Repositories | Collection |
T1052.001 | Exfiltration over USB | Exfiltration |
T1046 | Network Service Discovery | Discovery |
T1563.002 | RDP Hijacking | Lateral Movement |
T1092 | Communication Through Removable Media | Command and Control |
T1021.001 | Remote Desktop Protocol | Lateral Movement |
T1505.001 | SQL Stored Procedures | Persistence |
T1218.003 | CMSTP | Defense Evasion |
CSF Mapped to the NCSC CAF
Cyber Assessment Framework mappings generated from UK Cabinet Office data.
Control ID | Name | Description |
---|---|---|
A3.a | Asset Management | Everything required to deliver, maintain or support networks and information systems necessary for the operation of essential functions is determined and understood. This includes data, people and systems, as well as any supporting infrastructure (such as power or cooling). |
B3.a | Understanding Data | You have a good understanding of data important to the operation of the essential function, where it is stored, where it travels and how unavailability or unauthorised access, modification or deletion would adversely impact the essential function. This also applies to third parties storing or accessing data important to the operation of essential functions. |