- AR3
- -PR026
- -PR026.001
Remote Desktop (RDP) Access on Windows Systems - AR3
Contributor: The ITM Team @ - Subsection PR026.001
- AR3
- -PR027
- -PR027.002
Impersonation via Collaboration and Communication Tools - AR3
Contributor: The ITM Team @ - Subsection PR027.002
- AR3
- -PR027
- -PR027.003
Physical Impersonation Through Dress, Uniforms, or Appearance - AR3
Contributor: The ITM Team @ - Subsection PR027.003
- AR3
- -PR027
- -PR027.004
Cloning or Forging ID Cards for Physical Access - AR3
Contributor: The ITM Team @ - Subsection PR027.004
- AR5
- -AF022
- -AF022.001
Use of a Virtual Machine - AR5
Contributor: The ITM Team @ - Subsection AF022.001
- AR5
- -AF022
- -AF022.003
Portable Hypervisors - AR5
Contributor: The ITM Team @ - Subsection AF022.003
- AR5
- -AF022
- -AF022.004
Snapshots and Rollbacks to Remove Evidence - AR5
Contributor: The ITM Team @ - Subsection AF022.004
- Preventions
- -PV001
No Ready System-Level Mitigation - PV001
Contributor: The ITM Team @ - Prevention PV001
- Preventions
- -PV002
Restrict Access to Administrative Privileges - PV002
Contributor: The ITM Team @ - Prevention PV002
- Preventions
- -PV003
Enforce an Acceptable Use Policy - PV003
Contributor: The ITM Team @ - Prevention PV003