SC-30: Concealment and Misdirection

From NIST's SP800-53:

Employ the following concealment and misdirection techniques for [Assignment: organization-defined systems] at [Assignment: organization-defined time periods] to confuse and mislead adversaries: [Assignment: organization-defined concealment and misdirection techniques].

Cyber Threat Graph Context

Explore how this control relates to the wider threat graph

MITRE ATT&CK Techniques

See which MITRE ATT&CK techniques this control helps to protect against.

ATT&CK ID Title Associated Tactics
T1203 Exploitation for Client Execution Execution
T1190 Exploit Public-Facing Application Initial Access
T1189 Drive-by Compromise Initial Access
T1068 Exploitation for Privilege Escalation Privilege Escalation
T1212 Exploitation for Credential Access Credential Access
T1211 Exploitation for Defense Evasion Defense Evasion
T1210 Exploitation of Remote Services Lateral Movement