ICMF v1.0
Home Matrix Techniques Framework Whitepaper

Registry

Technique Registry

Full catalog of ICMF insider code manipulation techniques.

All Critical High Medium
All FIN AUTH AUD DATA XSYS
5 techniques
ID Technique Category Risk Evid.
ICMF-AUD-001 Audit Log Tampering AUD Critical L3
ICMF-AUD-002 Log Suppression Branch AUD High L3
ICMF-AUD-003 Audit Trail Deletion AUD Critical L4
ICMF-AUD-004 Misleading Audit Substitution AUD High L3
ICMF-AUD-005 Out-of-Band State Change AUD High L3
ICMF · Insider Code Manipulation Framework v1.0
General Inquiries contact@icmf.dev
Security Issues security@icmf.dev
CC BY-NC 4.0 SecodX Research GitHub