SC-39: Process Isolation

From NIST's SP800-53:

Maintain a separate execution domain for each executing system process.

Cyber Threat Graph Context

Explore how this control relates to the wider threat graph

SP800-53 Control Mapped to NIST Cyber Security Framework

Generated from NISTs SP800-53/CSF Crosswalk mappings.

Control ID Description
PR.PT-4 Communications and control networks are protected

MITRE ATT&CK Techniques

See which MITRE ATT&CK techniques this control helps to protect against.

ATT&CK ID Title Associated Tactics
T1003.002 Security Account Manager Credential Access
T1189 Drive-by Compromise Initial Access
T1003.001 LSASS Memory Credential Access
T1003.008 /etc/passwd and /etc/shadow Credential Access
T1211 Exploitation for Defense Evasion Defense Evasion
T1068 Exploitation for Privilege Escalation Privilege Escalation
T1003.007 Proc Filesystem Credential Access
T1203 Exploitation for Client Execution Execution
T1003 OS Credential Dumping Credential Access
T1556.001 Domain Controller Authentication Credential Access, Defense Evasion, Persistence
T1547.005 Security Support Provider Persistence, Privilege Escalation
T1556 Modify Authentication Process Credential Access, Defense Evasion, Persistence
T1003.005 Cached Domain Credentials Credential Access
T1547.008 LSASS Driver Persistence, Privilege Escalation
T1003.004 LSA Secrets Credential Access
T1212 Exploitation for Credential Access Credential Access
T1210 Exploitation of Remote Services Lateral Movement
T1003.006 DCSync Credential Access
T1003.003 NTDS Credential Access
T1611 Escape to Host Privilege Escalation
T1190 Exploit Public-Facing Application Initial Access
T1547.002 Authentication Package Persistence, Privilege Escalation