SC-30: Concealment and Misdirection
From NIST's SP800-53:
Employ the following concealment and misdirection techniques for [Assignment: organization-defined systems] at [Assignment: organization-defined time periods] to confuse and mislead adversaries: [Assignment: organization-defined concealment and misdirection techniques].
Cyber Threat Graph Context
Explore how this control relates to the wider threat graph
MITRE ATT&CK Techniques
See which MITRE ATT&CK techniques this control helps to protect against.
ATT&CK ID | Title | Associated Tactics |
---|---|---|
T1203 | Exploitation for Client Execution | Execution |
T1190 | Exploit Public-Facing Application | Initial Access |
T1189 | Drive-by Compromise | Initial Access |
T1068 | Exploitation for Privilege Escalation | Privilege Escalation |
T1212 | Exploitation for Credential Access | Credential Access |
T1211 | Exploitation for Defense Evasion | Defense Evasion |
T1210 | Exploitation of Remote Services | Lateral Movement |