SC-13: Cryptographic Protection

From NIST's SP800-53:

a. Determine the [Assignment: organization-defined cryptographic uses]; and b. Implement the following types of cryptography required for each specified cryptographic use: [Assignment: organization-defined types of cryptography for each specified cryptographic use].

Cyber Threat Graph Context

Explore how this control relates to the wider threat graph

SP800-53 Control Mapped to NIST Cyber Security Framework

Generated from NISTs SP800-53/CSF Crosswalk mappings.

Control ID Description
PR.DS-5 Protections against data leaks are implemented

MITRE ATT&CK Techniques

See which MITRE ATT&CK techniques this control helps to protect against.

ATT&CK ID Title Associated Tactics
T1048.003 Exfiltration Over Unencrypted Non-C2 Protocol Exfiltration
T1041 Exfiltration Over C2 Channel Exfiltration
T1005 Data from Local System Collection
T1025 Data from Removable Media Collection