System File Analysis

Monitoring system files such as authentication databases, configuration files, system logs, and system executables for modification or tampering.

ID: D3-SFA
Subclasses:  D3-SBV
Tactic:

Informational References

https://d3fend.mitre.org/technique/d3f:SystemFileAnalysis/

Countermeasures

ID Name Description NIST Rev5 D3FEND ISO 27001

Related SPARTA Techniques and Sub-Techniques

ID Name Description

Space Threats Mapped

ID Description

Sample Requirements

Requirement Rationale/Additional Guidance/Notes