SR-5: Acquisition Strategies, Tools, and Methods

From NIST's SP800-53:

Employ the following acquisition strategies, contract tools, and procurement methods to protect against, identify, and mitigate supply chain risks: [Assignment: organization-defined acquisition strategies, contract tools, and procurement methods].

Cyber Threat Graph Context

Explore how this control relates to the wider threat graph

MITRE ATT&CK Techniques

See which MITRE ATT&CK techniques this control helps to protect against.

ATT&CK ID Title Associated Tactics
T1059.002 AppleScript Execution
T1505 Server Software Component Persistence
T1554 Compromise Client Software Binary Persistence
T1505.001 SQL Stored Procedures Persistence
T1601 Modify System Image Defense Evasion
T1204.003 Malicious Image Execution
T1505.004 IIS Components Persistence
T1601.001 Patch System Image Defense Evasion
T1546.006 LC_LOAD_DYLIB Addition Persistence, Privilege Escalation
T1601.002 Downgrade System Image Defense Evasion
T1505.002 Transport Agent Persistence