Command and Control (C2)
The infrastructure and communication channels used by attackers to maintain control over compromised systems. C2 servers issue commands to malware or botnets and receive exfiltrated data.
Information SecurityRelated Frameworks
Frequently Asked Questions
What is Command and Control (C2)?
The infrastructure and communication channels used by attackers to maintain control over compromised systems. C2 servers issue commands to malware or botnets and receive exfiltrated data.
Why is Command and Control (C2) important for compliance?
Command and Control (C2) is a key concept in Information Security. Understanding command and control (c2) helps organizations meet regulatory requirements, reduce risk, and demonstrate due diligence during audits. Our compliance platform covers this concept across 692 frameworks with 819,000+ control mappings.
Where can I learn more about Command and Control (C2)?
Explore our compliance framework pages to see how command and control (c2) applies across different standards and regulations. Our implementation guides provide step-by-step guidance, and the compliance platform offers AI-powered analysis of how this concept maps across 692 frameworks.
See how Command and Control (C2) applies across compliance frameworks
Our AI-powered platform maps 692 frameworks with 819,000+ control connections. Explore how this concept is addressed across standards.