Control Mapping

tile_identifiertitledashboardsecurity_features_checklistnist_800_53nist_800_171hitrust_csf_v9mitre_attack_saas
AUTH-1Login failures, by User and ReasonAuthenticationAC-73.5PR.DS-5:G5T1110- Brute Force
AUTH-3Breakdown by MethodAuthenticationA53.5.2, 3.5.3PR.AC-1:G7, G10T1550 - Use Alternate Authentication Material, T1556 - Modify Authentication Process
CONFIG-1Network Policy Change ManagementConfigurationA5CM-23.1.1, 3.4.2PR.DS-6:G3T1098 - Account Manipulation
SECRETS-2ACCOUNTADMINs that do not use MFASecrets & Privileged AccessA2CM-2, 33.5.2PR.MA-1:G3
SECRETS-3Privileged Object ManagementSecrets & Privileged AccessA11DE.CM-6:G3
SECRETS-4Key Pair Bypass (Password)Secrets & Privileged AccessA6AC-2(1)PR.MA-1:G3T1550 - Use Alternate Authentication Material
SECRETS-5SCIM Token LifecycleSecrets & Privileged AccessA2, A3CM-3PR.IP-11:G1
SECRETS-8Grants to PUBLIC roleSecrets & Privileged AccessAC-3(1)PR.AC-4:G3T1098 - Account Manipulation
SECRETS-9Default Role is ACCOUNTADMINSecrets & Privileged AccessAC-3PR.AC-7:G8, PR.AT-2:G2*
SECRETS-10Grants to unmanaged schemas outside schema ownerSecrets & Privileged AccessA13AC-3(7)PR.AC-4:G1
SECRETS-13Stale usersSecrets & Privileged AccessAC-2(3)a3.5.6PR.AC-4:G3
USER-1Most Dangerous UserUsersAC-6PR.IP-11:G2
USER-3Users by Password AgeUsersA7AC-2(1)PR.IP-11:G2
ROLES-1User to Role Ratio (larger is better)RolesPR.AC-4:G1
ROLES-2Average Number of Role Grants per User (~5-10)RolesPR.AC-4:G1
ROLES-3Least Used Role GrantsRolesPR.AC-4:G1
ROLES-5Bloated rolesRolesPR.AC-4:G1
ROLES-7ACCOUNTADMIN GrantsRolesPR.AC-4:G3T1060- Permission Group Discovery, T1078 - Privilege Escalation, T1546 - Event Triggered Escalation, T1098 - Account Manipulation
SHARING-1Reader account creationData Sharing
SHARING-2Changes to sharesData Sharing
SHARING-3Changes to listingsData Sharing
SHARING-4Shares usage statisticsData Sharing
SHARING-5Replication usageData Sharing
SHARING-6Aggregate View of Access Over Time by ConsumerData Sharing
SHARING-7Access Count By ColumnData Sharing
SHARING-8Table Joins By ConsumerData Sharing
MAY30_TTPS_GUIDANCE-1Monitored IPs loginsMAY30_TTPS_GUIDANCE
MAY30_TTPS_GUIDANCE-2Aggregate of client IPs leveraged at authentication for service discoveryMAY30_TTPS_GUIDANCE
MAY30_TTPS_GUIDANCE-3Authentication patterns ordered by timestampMAY30_TTPS_GUIDANCE
MAY30_TTPS_GUIDANCE-4Users with static credentialsMAY30_TTPS_GUIDANCE
MAY30_TTPS_GUIDANCE-5Monitored query historyMAY30_TTPS_GUIDANCE
MAY30_TTPS_GUIDANCE-10Anomalous Application AccessMAY30_TTPS_GUIDANCE