SC-26 Decoys

System and Communications Protection

Description

Include components within organizational systems specifically designed to be the target of malicious attacks for detecting, deflecting, and analyzing such attacks.

Supplemental Guidance

Decoys (i.e., honeypots, honeynets, or deception nets) are established to attract adversaries and deflect attacks away from the operational systems that support organizational mission and business functions. Use of decoys requires some supporting isolation measures to ensure that any deflected malicious code does not infect organizational systems. Depending on the specific usage of the decoy, consultation with the Office of the General Counsel before deployment may be needed.

Changes from Rev 4

Title changed from 'Honeypots' to 'Decoys' in Rev 5.

MITRE ATT&CK Techniques (3)

ATT&CK v16.1

Techniques mitigated by this control, mapped via CTID.

Defense Evasion 1 Credential Access 1 Lateral Movement 1

Compliance Mappings

PCI DSS v4.0.1

11.111.4

MAS TRM

12

RBI CSF

Annex1.13

SAMA CSF

3.6

CBB TM

TM-12

Qatar NIA

CS

CBUAE

CR-3

CBE CSF

CD-1

SA JS2

JS2-7.3

CBN CSF

Part3.5Part4

BoM CTRM

4.2

CPMI-IOSCO PFMI

CG.DECG.TE

ECB CROE

CROE.2.4CROE.2.6.2

SEBI CSCRF

DE.CMSOC

BOT Cyber Resilience

Ch3.1Ch8.1

CBEST

CBEST.4

TIBER-EU

TIBER.RT