Description
Validate information output from the following software programs and/or applications to ensure that the information is consistent with the expected content: [Assignment: organization-defined parameters].
Supplemental Guidance
Certain types of attacks, including SQL injections, produce output results that are unexpected or inconsistent with the output results that would be expected from software programs or applications. Information output filtering focuses on detecting extraneous content, preventing such extraneous content from being displayed, and then alerting monitoring tools that anomalous behavior has been discovered.
Changes from Rev 4
No significant title changes from Rev 4.
MITRE ATT&CK Techniques (42)
ATT&CK v16.1Techniques mitigated by this control, mapped via CTID.
Persistence 3 Defense Evasion 9 Credential Access 7 Discovery 1 Lateral Movement 3 Collection 8 Command & Control 8 Exfiltration 5 Impact 8
Show all 42 techniques grouped by tactic
Defense Evasion
Credential Access
Discovery
Lateral Movement
Collection
Command & Control
Exfiltration
Compliance Mappings
COBIT 2019
DSS06
RBI CSF
Annex1.6
CBUAE
CR-6
CBE CSF
CTO-4
SA JS2
JS2-SA
BoG CISD
CISD-SDLC
BCBS 239
Principle 3Principle 7Principle 9
PRA SS1/23
P3.2
HITRUST CSF v11
10.b
Basel SCO60
SCO60.70SCO60.72