SR-11: Component Authenticity
From NIST's SP800-53:
a. Develop and implement anti-counterfeit policy and procedures that include the means to detect and prevent counterfeit components from entering the system; and b. Report counterfeit system components to [Selection (one or more): source of counterfeit component; [Assignment: organization-defined external reporting organizations]; [Assignment: organization-defined personnel or roles]].
Cyber Threat Graph Context
Explore how this control relates to the wider threat graph
MITRE ATT&CK Techniques
See which MITRE ATT&CK techniques this control helps to protect against.
ATT&CK ID | Title | Associated Tactics |
---|---|---|
T1601 | Modify System Image | Defense Evasion |
T1059.002 | AppleScript | Execution |
T1505.002 | Transport Agent | Persistence |
T1505.001 | SQL Stored Procedures | Persistence |
T1505.004 | IIS Components | Persistence |
T1601.002 | Downgrade System Image | Defense Evasion |
T1601.001 | Patch System Image | Defense Evasion |
T1505 | Server Software Component | Persistence |
T1554 | Compromise Client Software Binary | Persistence |
T1204.003 | Malicious Image | Execution |
T1546.006 | LC_LOAD_DYLIB Addition | Persistence, Privilege Escalation |