AC-19: Access Control for Mobile Devices
From NIST's SP800-53:
a. Establish configuration requirements, connection requirements, and implementation guidance for organization-controlled mobile devices, to include when such devices are outside of controlled areas; and b. Authorize the connection of mobile devices to organizational systems.
Cyber Threat Graph Context
Explore how this control relates to the wider threat graph
SP800-53 Control Mapped to NIST Cyber Security Framework
Generated from NISTs SP800-53/CSF Crosswalk mappings.
MITRE ATT&CK Techniques
See which MITRE ATT&CK techniques this control helps to protect against.
ATT&CK ID | Title | Associated Tactics |
---|---|---|
T1558.004 | AS-REP Roasting | Credential Access |
T1070.002 | Clear Linux or Mac System Logs | Defense Evasion |
T1070 | Indicator Removal | Defense Evasion |
T1552.004 | Private Keys | Credential Access |
T1558.003 | Kerberoasting | Credential Access |
T1602 | Data from Configuration Repository | Collection |
T1020.001 | Traffic Duplication | Exfiltration |
T1114 | Email Collection | Collection |
T1602.001 | SNMP (MIB Dump) | Collection |
T1550.001 | Application Access Token | Defense Evasion, Lateral Movement |
T1557.002 | ARP Cache Poisoning | Collection, Credential Access |
T1070.001 | Clear Windows Event Logs | Defense Evasion |
T1558.002 | Silver Ticket | Credential Access |
T1114.003 | Email Forwarding Rule | Collection |
T1119 | Automated Collection | Collection |
T1114.001 | Local Email Collection | Collection |
T1070.008 | Clear Mailbox Data | Defense Evasion |
T1602.002 | Network Device Configuration Dump | Collection |
T1114.002 | Remote Email Collection | Collection |
T1552 | Unsecured Credentials | Credential Access |
T1565 | Data Manipulation | Impact |
T1565.002 | Transmitted Data Manipulation | Impact |
T1040 | Network Sniffing | Credential Access, Discovery |
T1565.001 | Stored Data Manipulation | Impact |
T1557 | Adversary-in-the-Middle | Collection, Credential Access |
T1530 | Data from Cloud Storage | Collection |
T1558 | Steal or Forge Kerberos Tickets | Credential Access |