Security Control Assessment

Responsible for conducting independent comprehensive assessments of management, operational, and technical security controls and control enhancements employed within or inherited by a system to determine their overall effectiveness.

  • T0309: Assess the effectiveness of security controls
  • T0495: Manage Accreditation Packages (e.g., ISO/IEC 15026-2)
  • T1012: Expand network access
  • T1013: Conduct technical exploitation of a target
  • T1019: Determine special needs of cyber-physical systems
  • T1020: Determine the operational and safety impacts of cybersecurity lapses
  • T1021: Review cyber defense service provider reporting structure
  • T1022: Review enterprise information technology (IT) goals and objectives
  • T1023: Identify critical technology procurement requirements
  • T1026: Determine procurement requirements
  • T1030: Estimate the impact of collateral damage
  • T1036: Integrate leadership priorities
  • T1038: Integrate organization objectives in intelligence collection
  • T1041: Determine impact of software configurations
  • T1046: Assess operation performance
  • T1047: Assess operation impact
  • T1054: Scope analysis reports to various audiences that accounts for data sharing classification restrictions
  • T1055: Determine if priority information requirements are satisfied
  • T1079: Develop cybersecurity risk profiles
  • T1084: Identify anomalous network activity
  • T1118: Identify vulnerabilities
  • T1119: Recommend vulnerability remediation strategies
  • T1232: Approve accreditation packages
  • T1263: Perform security reviews
  • T1264: Identify gaps in security architecture
  • T1265: Develop a cybersecurity risk management plan
  • T1266: Recommend risk mitigation strategies
  • T1269: Conduct risk analysis of applications and systems undergoing major changes
  • T1270: Plan security authorization reviews for system and network installations
  • T1271: Conduct security authorization reviews for system and network installations
  • T1272: Develop security assurance cases for system and network installations
  • T1294: Advise on Risk Management Framework process activities and documentation
  • T1305: Determine if authorization and assurance documents identify an acceptable level of risk for software applications, systems, and networks
  • T1327: Update security documentation to reflect current application and system security design features
  • T1328: Verify implementation of software, network, and system cybersecurity postures
  • T1329: Document software, network, and system deviations from implemented security postures
  • T1330: Recommend required actions to correct software, network, and system deviations from implemented security postures
  • T1339: Develop cybersecurity compliance processes for external services
  • T1340: Develop cybersecurity audit processes for external services
  • T1343: Provide cybersecurity guidance to organizational risk governance processes
  • T1355: Determine if vulnerability remediation plans are in place
  • T1356: Develop vulnerability remediation plans
  • T1357: Determine if cybersecurity requirements have been successfully implemented
  • T1358: Determine the effectiveness of organizational cybersecurity policies and procedures
  • T1361: Determine the impact of new system and interface implementations on organization's cybersecurity posture
  • T1362: Document impact of new system and interface implementations on organization's cybersecurity posture
  • T1365: Document cybersecurity design and development activities
  • T1368: Support cybersecurity compliance activities
  • T1369: Determine if acquisitions, procurement, and outsourcing efforts address cybersecurity requirements
  • T1437: Determine effectiveness of configuration management processes
  • T1489: Correlate incident data
  • T1829: Evaluate locally developed tools