SC-29: Heterogeneity

From NIST's SP800-53:

Employ a diverse set of information technologies for the following system components in the implementation of the system: [Assignment: organization-defined system components].

Cyber Threat Graph Context

Explore how this control relates to the wider threat graph

SP800-53 Control Mapped to NIST Cyber Security Framework

Generated from NISTs SP800-53/CSF Crosswalk mappings.

Control ID Description
PR.PT-4 Communications and control networks are protected

MITRE ATT&CK Techniques

See which MITRE ATT&CK techniques this control helps to protect against.

ATT&CK ID Title Associated Tactics
T1212 Exploitation for Credential Access Credential Access
T1210 Exploitation of Remote Services Lateral Movement
T1068 Exploitation for Privilege Escalation Privilege Escalation
T1211 Exploitation for Defense Evasion Defense Evasion
T1203 Exploitation for Client Execution Execution
T1189 Drive-by Compromise Initial Access
T1190 Exploit Public-Facing Application Initial Access