CM-10: Software Usage Restrictions
From NIST's SP800-53:
a. Use software and associated documentation in accordance with contract agreements and copyright laws; b. Track the use of software and associated documentation protected by quantity licenses to control copying and distribution; and c. Control and document the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work.
Cyber Threat Graph Context
Explore how this control relates to the wider threat graph
SP800-53 Control Mapped to NIST Cyber Security Framework
Generated from NISTs SP800-53/CSF Crosswalk mappings.
Control ID | Description |
---|---|
DE.CM-3 | Personnel activity is monitored to detect potential cybersecurity events |
MITRE ATT&CK Techniques
See which MITRE ATT&CK techniques this control helps to protect against.
ATT&CK ID | Title | Associated Tactics |
---|---|---|
T1559.002 | Dynamic Data Exchange | Execution |
T1562.009 | Safe Mode Boot | Defense Evasion |
T1550.001 | Application Access Token | Defense Evasion, Lateral Movement |
T1553 | Subvert Trust Controls | Defense Evasion |
T1546.008 | Accessibility Features | Persistence, Privilege Escalation |
T1546.013 | PowerShell Profile | Persistence, Privilege Escalation |
T1559 | Inter-Process Communication | Execution |
T1562.006 | Indicator Blocking | Defense Evasion |
T1553.004 | Install Root Certificate | Defense Evasion |