Description
The information system limits the use of resources by priority.
Supplemental Guidance
Priority protection helps prevent a lower-priority process from delaying or interfering with the information system servicing any higher-priority process.
Enhancements
(0) None.
MITRE ATT&CK Techniques (1)
ATT&CK v16.1Techniques mitigated by this control, mapped via CTID.
Defense Evasion 1
Defense Evasion
Compliance Mappings
ISO 27001:2022
A.8.6
SOC 2 TSC
A1.1
CSA CCM v4
IVS-02
CSA AICM v1
I&S-02
ISO 42001:2023
A.4.5
IEC 62443
3-3 SR 7.2
ANSSI
Hygiene.23SecNumCloud.13.3
FINMA Circular 2023/1
IV.A(28)IV.A(29)
OSFI B-13
B-13.2.6
EU GDPR
Art.32(1)(b)
EU DORA
Art.9(2)
FISC Security Guidelines
FISC.O13
HKMA TM-E-1
TME1.5.3
EU CRA
CRA.I.2h
UAE IA
T7
CBB TM
TM-5
BCBS 239
Principle 5
EBA ICT Guidelines
3.5(a)
Common Criteria
CC Part 2 — FRU/FTA/FTP
FCA SYSC 13
SYSC 13.7.2SYSC 13.8.2
Basel SCO60
SCO60.53
ISO 17799 (legacy)
None.
COBIT 4.1 (legacy)
None.