SC-23: Session Authenticity
From NIST's SP800-53:
Protect the authenticity of communications sessions.
Cyber Threat Graph Context
Explore how this control relates to the wider threat graph
SP800-53 Control Mapped to NIST Cyber Security Framework
Generated from NISTs SP800-53/CSF Crosswalk mappings.
MITRE ATT&CK Techniques
See which MITRE ATT&CK techniques this control helps to protect against.
| ATT&CK ID | Title | Associated Tactics |
|---|---|---|
| T1562.006 | Indicator Blocking | Defense Evasion |
| T1071 | Application Layer Protocol | Command and Control |
| T1071.003 | Mail Protocols | Command and Control |
| T1071.004 | DNS | Command and Control |
| T1557 | Adversary-in-the-Middle | Collection, Credential Access |
| T1573.001 | Symmetric Cryptography | Command and Control |
| T1573 | Encrypted Channel | Command and Control |
| T1185 | Browser Session Hijacking | Collection |
| T1557.002 | ARP Cache Poisoning | Collection, Credential Access |
| T1622 | Debugger Evasion | Defense Evasion, Discovery |
| T1562.009 | Safe Mode Boot | Defense Evasion |
| T1071.002 | File Transfer Protocols | Command and Control |
| T1071.001 | Web Protocols | Command and Control |
| T1563.001 | SSH Hijacking | Lateral Movement |
| T1557.003 | DHCP Spoofing | Collection, Credential Access |
| T1535 | Unused/Unsupported Cloud Regions | Defense Evasion |
| T1550.004 | Web Session Cookie | Defense Evasion, Lateral Movement |
| T1573.002 | Asymmetric Cryptography | Command and Control |
| T1557.001 | LLMNR/NBT-NS Poisoning and SMB Relay | Collection, Credential Access |