TLCTC v2.0 Control Matrix generated by Claude 4.5 Opus

Practical Controls for SME & Private Users

⟲ Cross-Cutting Control: UPDATES

Updates/Patching applies across clusters #1–#8. Even home Windows/Mac systems run server processes (SMB, RDP, Print Spooler, mDNS) that are regularly exploited. Controls marked with are cross-cutting and protect against multiple threat clusters.

#1 Config fixes #2 Server patches #3 Client patches #4 Auth fixes #5 Protocol updates #6 Resource handling #7 Execution controls #8 Firmware/encryption

SME Mode — 10 Clusters × 6 Functions × 2 Aspects

For organizations with an IT-responsible role. Each function has Technical/Process and Organizational/Awareness aspects.

GOVERN
IDENTIFY
PROTECT
DETECT
RESPOND
RECOVER
Cross-Cutting

📖 Reference Information

What is TLCTC?

Top Level Cyber Threat Clusters is a cause-oriented framework that classifies cyber threats by the generic vulnerability they exploit, not by outcomes or actors. It provides a stable vocabulary for discussing and managing cyber risk across 10 non-overlapping clusters.

NIST CSF 2.0 Functions

GOVERN (ownership & policy), IDENTIFY (know your risks), PROTECT (prevent), DETECT (spot threats), RESPOND (act quickly), RECOVER (restore & learn). Controls are mapped to each function per threat cluster.

SME vs Private

SME mode assumes a dedicated IT role, budget, and basic infrastructure (10×12 matrix). Private mode assumes personal devices, home/mobile context, and free tools only (10×6 matrix). Both are fully operational.

Cross-Cutting Controls

Some controls (like Updates) protect against multiple clusters simultaneously. These are marked with ⟲ in the matrix. Prioritize these for maximum security ROI.

How Updates Protect Each Cluster

ClusterWhat Updates FixExample
#1 Abuse of FunctionsClose feature abuse vectors, fix insecure defaultsWindows feature updates changing default permissions
#2 Exploiting ServerPatch listening services vulnerabilitiesEternalBlue (SMB), PrintNightmare, BlueKeep (RDP)
#3 Exploiting ClientBrowser engines, document parsers, media handlersChrome zero-days, PDF exploits, Office macros
#4 Identity TheftAuthentication mechanisms, session handlingKerberos fixes, cookie security, token validation
#5 Man in the MiddleTLS/SSL libraries, certificate handling, protocolsOpenSSL patches, TLS 1.3 adoption, HSTS preload
#6 Flooding AttackResource handling, connection limits, memory mgmtTCP stack improvements, SYN cookie updates
#7 MalwareOS hardening, execution controls, AV signaturesAMSI updates, Defender definitions, kernel protections
#8 Physical AttackEncryption, lock screen, firmware securityBitLocker improvements, Secure Boot updates, TPM

Why #2 (Exploiting Server) Matters for Home Users

Your Windows PC runs server processes that listen for network connections. These are attack vectors even on home networks:

ServicePortRiskNotable Exploits
SMB (File Sharing)445HighEternalBlue (WannaCry), SMBGhost
RDP (Remote Desktop)3389HighBlueKeep, DejaBlue
Print SpoolerVariousHighPrintNightmare, multiple CVEs
LLMNR/NBT-NS5355/137MediumName resolution poisoning
UPnP/SSDP1900MediumDevice discovery attacks
Windows Remote Mgmt5985/5986MediumWinRM exploitation
mDNS (Bonjour)5353LowService discovery abuse

Key Actions: Enable Windows Firewall, disable unused services, keep Windows Update on automatic, consider disabling SMBv1.

Interactive Matrix

Click any cell to expand and see detailed controls. Use the SME/Private toggle to switch between organizational and personal views. Color coding matches NIST CSF functions.

Export Options

Download as JSON for system integration or programmatic use. Download as CSV for spreadsheet editing, customization, and printing. Exports include the currently selected mode.

Prioritization

Start with cross-cutting controls (marked ⟲) for maximum impact. Focus on PROTECT column first, then DETECT. GOVERN ensures sustainability of all other controls.

Customization

Export to CSV, customize controls for your environment, add responsible parties and deadlines. Re-import to your GRC tool or use as a living checklist.