SC-8: Transmission Confidentiality and Integrity
From NIST's SP800-53:
Protect the [Selection (one or more): confidentiality; integrity] of transmitted information.
Cyber Threat Graph Context
Explore how this control relates to the wider threat graph
SP800-53 Control Mapped to NIST Cyber Security Framework
Generated from NISTs SP800-53/CSF Crosswalk mappings.
MITRE ATT&CK Techniques
See which MITRE ATT&CK techniques this control helps to protect against.
ATT&CK ID | Title | Associated Tactics |
---|---|---|
T1557 | Adversary-in-the-Middle | Collection, Credential Access |
T1040 | Network Sniffing | Credential Access, Discovery |
T1622 | Debugger Evasion | Defense Evasion, Discovery |
T1550.004 | Web Session Cookie | Defense Evasion, Lateral Movement |
T1557.001 | LLMNR/NBT-NS Poisoning and SMB Relay | Collection, Credential Access |
T1562.009 | Safe Mode Boot | Defense Evasion |
T1602 | Data from Configuration Repository | Collection |
T1552.007 | Container API | Credential Access |
T1562.006 | Indicator Blocking | Defense Evasion |
T1602.001 | SNMP (MIB Dump) | Collection |
T1090.004 | Domain Fronting | Command and Control |
T1090 | Proxy | Command and Control |
T1557.002 | ARP Cache Poisoning | Collection, Credential Access |
T1602.002 | Network Device Configuration Dump | Collection |
T1557.003 | DHCP Spoofing | Collection, Credential Access |
T1550.001 | Application Access Token | Defense Evasion, Lateral Movement |
T1020.001 | Traffic Duplication | Exfiltration |