This site has been deprecated in favor of https://attack.mitre.org and will remain in place until 11/1/22.

Operating System Configuration

From attackics
Revision as of 14:13, 10 April 2021 by Oalexander (talk | contribs) (Oalexander moved page Operating System Configuration to Operating System Configuration)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search
Operating System Configuration
Mitigation
ID M0928
NIST SP 800-53 Rev. 4 CM-7
IEC 62443-3-3:2013 SR 7.7
IEC 62443-4-2:2019 CR 7.7

Description

Make configuration changes related to the operating system or a common feature of the operating system that result in system hardening against techniques.


Techniques Addressed by Mitigation

NameUse
Replication Through Removable MediaHarden the system through operating system controls to prevent the known or unknown use of malicious removable media.