IA-6: Authentication Feedback

From NIST's SP800-53:

Obscure feedback of authentication information during the authentication process to protect the information from possible exploitation and use by unauthorized individuals.

Cyber Threat Graph Context

Explore how this control relates to the wider threat graph

SP800-53 Control Mapped to NIST Cyber Security Framework

Generated from NISTs SP800-53/CSF Crosswalk mappings.

Control ID Description
PR.AC-1 Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and processes

MITRE ATT&CK Techniques

See which MITRE ATT&CK techniques this control helps to protect against.

ATT&CK ID Title Associated Tactics
T1578.003 Delete Cloud Instance Defense Evasion
T1530 Data from Cloud Storage Collection
T1578 Modify Cloud Compute Infrastructure Defense Evasion
T1563 Remote Service Session Hijacking Lateral Movement
T1021.005 VNC Lateral Movement
T1021.001 Remote Desktop Protocol Lateral Movement
T1578.001 Create Snapshot Defense Evasion
T1578.002 Create Cloud Instance Defense Evasion