SC-44: Detonation Chambers

From NIST's SP800-53:

Employ a detonation chamber capability within [Assignment: organization-defined system, system component, or location].

Cyber Threat Graph Context

Explore how this control relates to the wider threat graph

SP800-53 Control Mapped to NIST Cyber Security Framework

Generated from NISTs SP800-53/CSF Crosswalk mappings.

Control ID Description
DE.CM-5 Unauthorized mobile code is detected

MITRE ATT&CK Techniques

See which MITRE ATT&CK techniques this control helps to protect against.

ATT&CK ID Title Associated Tactics
T1598.002 Spearphishing Attachment Reconnaissance
T1598 Phishing for Information Reconnaissance
T1204.002 Malicious File Execution
T1204 User Execution Execution
T1137.006 Add-ins Persistence
T1137.001 Office Template Macros Persistence
T1566 Phishing Initial Access
T1564.009 Resource Forking Defense Evasion
T1203 Exploitation for Client Execution Execution
T1566.003 Spearphishing via Service Initial Access
T1566.001 Spearphishing Attachment Initial Access
T1221 Template Injection Defense Evasion
T1137.004 Outlook Home Page Persistence
T1137.002 Office Test Persistence
T1204.001 Malicious Link Execution
T1204.003 Malicious Image Execution
T1598.001 Spearphishing Service Reconnaissance
T1137.005 Outlook Rules Persistence
T1566.002 Spearphishing Link Initial Access
T1598.003 Spearphishing Link Reconnaissance
T1137 Office Application Startup Persistence
T1137.003 Outlook Forms Persistence