SC-2: Separation of System and User Functionality

From NIST's SP800-53:

Separate user functionality, including user interface services, from system management functionality.

Cyber Threat Graph Context

Explore how this control relates to the wider threat graph

MITRE ATT&CK Techniques

See which MITRE ATT&CK techniques this control helps to protect against.

ATT&CK ID Title Associated Tactics
T1211 Exploitation for Defense Evasion Defense Evasion
T1611 Escape to Host Privilege Escalation
T1068 Exploitation for Privilege Escalation Privilege Escalation
T1189 Drive-by Compromise Initial Access
T1203 Exploitation for Client Execution Execution
T1190 Exploit Public-Facing Application Initial Access
T1212 Exploitation for Credential Access Credential Access
T1210 Exploitation of Remote Services Lateral Movement