• xThreat Vector: Lateral Movement
IDNameBaselinesPriorityThreats
LowModerateHigh
AC-2Account Management
  • P1
STRIDE-LM
(6)Dynamic Privilege Management   
  • P1
STRIDE-LM
(7)Role-Based Schemes   
  • P1
STRIDE-LM
(12)Account Monitoring / Atypical Usage  
  • P1
STRIDE-LM
AC-10Concurrent Session Control  
  • P3
STRIDE-LM
AC-17Remote Access
  • P1
STRIDE-LM
(1)Automated Monitoring / Control 
  • P1
STRIDE-LM
(3)Managed Access Control Points 
  • P1
STRIDE-LM
(4)Privileged Commands / Access 
  • P1
STRIDE-LM
(9)Disconnect / Disable Access   
  • P1
STRIDE-LM
AC-18Wireless Access
  • P1
STRIDE-LM
(1)Authentication And Encryption 
  • P1
STRIDE-LM
(3)Disable Wireless Networking   
  • P1
STRIDE-LM
(5)Antennas / Transmission Power Levels  
  • P1
STRIDE-LM
AU-6Audit Review, Analysis, And Reporting
  • P1
STRIDE-LM
(3)Correlate Audit Repositories 
  • P1
STRIDE-LM
(5)Integration / Scanning And Monitoring Capabilities  
  • P1
STRIDE-LM
(6)Correlation With Physical Monitoring  
  • P1
STRIDE-LM
(9)Correlation With Information From Nontechnical Sources   
  • P1
STRIDE-LM
IA-5(8)Multiple Information System Accounts   
  • P1
STRIDE-LM
MA-4Nonlocal Maintenance
  • P2
STRIDE-LM
(1)Auditing And Review   
  • P2
STRIDE-LM
(2)Document Nonlocal Maintenance 
  • P2
STRIDE-LM
(3)Comparable Security / Sanitization  
  • P2
STRIDE-LM
(4)Authentication / Separation Of Maintenance Sessions   
  • P2
STRIDE-LM
(5)Approvals And Notifications   
  • P2
STRIDE-LM
(6)Cryptographic Protection   
  • P2
STRIDE-LM
(7)Remote Disconnect Verification   
  • P2
STRIDE-LM
SC-7Boundary Protection
  • P1
STRIDE-LM
(3)Access Points 
  • P1
STRIDE-LM
(4)External Telecommunications Services 
  • P1
STRIDE-LM
(5)Deny By Default / Allow By Exception 
  • P1
STRIDE-LM
(7)Prevent Split Tunneling For Remote Devices 
  • P1
STRIDE-LM
(8)Route Traffic To Authenticated Proxy Servers  
  • P1
STRIDE-LM
(9)Restrict Threatening Outgoing Communications Traffic   
  • P1
STRIDE-LM
(10)Prevent Unauthorized Exfiltration   
  • P1
STRIDE-LM
(11)Restrict Incoming Communications Traffic   
  • P1
STRIDE-LM
(12)Host-Based Protection   
  • P1
STRIDE-LM
(13)Isolation Of Security Tools / Mechanisms / Support Components   
  • P1
STRIDE-LM
(14)Protects Against Unauthorized Physical Connections   
  • P1
STRIDE-LM
(15)Route Privileged Network Accesses   
  • P1
STRIDE-LM
(16)Prevent Discovery Of Components / Devices   
  • P1
STRIDE-LM
(17)Automated Enforcement Of Protocol Formats   
  • P1
STRIDE-LM
(18)Fail Secure  
  • P1
STRIDE-LM
(19)Blocks Communication From Non-Organizationally Configured Hosts   
  • P1
STRIDE-LM
(20)Dynamic Isolation / Segregation   
  • P1
STRIDE-LM
(21)Isolation Of Information System Components  
  • P1
STRIDE-LM
(22)Separate Subnets For Connecting To Different Security Domains   
  • P1
STRIDE-LM
(23)Disable Sender Feedback On Protocol Validation Failure   
  • P1
STRIDE-LM
SC-10Network Disconnect 
  • P2
STRIDE-LM