SC-8: Transmission Confidentiality and Integrity

From NIST's SP800-53:

Protect the [Selection (one or more): confidentiality; integrity] of transmitted information.

Cyber Threat Graph Context

Explore how this control relates to the wider threat graph

SP800-53 Control Mapped to NIST Cyber Security Framework

Generated from NISTs SP800-53/CSF Crosswalk mappings.

Control ID Description
PR.DS-2 Data-in-transit is protected
PR.DS-5 Protections against data leaks are implemented

MITRE ATT&CK Techniques

See which MITRE ATT&CK techniques this control helps to protect against.

ATT&CK ID Title Associated Tactics
T1557 Adversary-in-the-Middle Collection, Credential Access
T1040 Network Sniffing Credential Access, Discovery
T1622 Debugger Evasion Defense Evasion, Discovery
T1550.004 Web Session Cookie Defense Evasion, Lateral Movement
T1557.001 LLMNR/NBT-NS Poisoning and SMB Relay Collection, Credential Access
T1562.009 Safe Mode Boot Defense Evasion
T1602 Data from Configuration Repository Collection
T1552.007 Container API Credential Access
T1562.006 Indicator Blocking Defense Evasion
T1602.001 SNMP (MIB Dump) Collection
T1090.004 Domain Fronting Command and Control
T1090 Proxy Command and Control
T1557.002 ARP Cache Poisoning Collection, Credential Access
T1602.002 Network Device Configuration Dump Collection
T1557.003 DHCP Spoofing Collection, Credential Access
T1550.001 Application Access Token Defense Evasion, Lateral Movement
T1020.001 Traffic Duplication Exfiltration