Command and Control consists of techniques that adversaries may use to communicate with systems under their control. Adversaries commonly attempt to mimic normal, expected traffic to avoid detection [1].
If the attacker has the system under its control, he can interact with it to command it
| ID | Mitigation | Description |
|---|---|---|
| M2046 | Anti-replay protection mechanisms | |
| M2070 | Internal segregation and /or authentication | |
| M2069 | Strong authentication of Telecommands |