SR-4: Provenance
From NIST's SP800-53:
Document, monitor, and maintain valid provenance of the following systems, system components, and associated data: [Assignment: organization-defined systems, system components, and associated data].
Cyber Threat Graph Context
Explore how this control relates to the wider threat graph
MITRE ATT&CK Techniques
See which MITRE ATT&CK techniques this control helps to protect against.
ATT&CK ID | Title | Associated Tactics |
---|---|---|
T1041 | Exfiltration Over C2 Channel | Exfiltration |
T1048.002 | Exfiltration Over Asymmetric Encrypted Non-C2 Protocol | Exfiltration |
T1554 | Compromise Client Software Binary | Persistence |
T1048.003 | Exfiltration Over Unencrypted Non-C2 Protocol | Exfiltration |
T1601 | Modify System Image | Defense Evasion |
T1505.001 | SQL Stored Procedures | Persistence |
T1048 | Exfiltration Over Alternative Protocol | Exfiltration |
T1601.001 | Patch System Image | Defense Evasion |
T1546.006 | LC_LOAD_DYLIB Addition | Persistence, Privilege Escalation |
T1204.003 | Malicious Image | Execution |
T1567 | Exfiltration Over Web Service | Exfiltration |
T1052.001 | Exfiltration over USB | Exfiltration |
T1505.004 | IIS Components | Persistence |
T1505 | Server Software Component | Persistence |
T1052 | Exfiltration Over Physical Medium | Exfiltration |
T1601.002 | Downgrade System Image | Defense Evasion |
T1505.002 | Transport Agent | Persistence |
T1059.002 | AppleScript | Execution |