This site has been deprecated in favor of https://attack.mitre.org and will remain in place until 11/1/22.

Property:Has mitigation

From attackics
Jump to navigation Jump to search

This is a property of type Text.

Showing 20 pages using this property.
A
Mitigation/M0800  +, Mitigation/M0804  +, Mitigation/M0802  +, ,
Mitigation/M0807  +, Mitigation/M0810  +, Mitigation/M0814  +,
Mitigation/M0807  +, Mitigation/M0930  +
B
* Implement Virtual Local Area Networks (VLANs) to divide physical networks into smaller   +, logical ones with isolated traffic from each other. This limits both broadcast traffic and unnecessary flooding.[[CiteRef::Guidance - NIST SP800-82]] * Secure the environment to minimize wires susceptible to interference and limit access points to cables. Keep the ICS and IT networks separate.[[CiteRef::Guidance - NIST SP800-82]] * Monitor the network for expected outcomes and to detect unexpected states.[[CiteRef::Guidance - NIST SP800-82]] * Implement antivirus and malware detection tools to protect against threats  +, such as code enabling improper network access.[[CiteRef::Guidance - NIST SP800-82]]  +, ,
*Implement Virtual Local Area Networks (VLANs) to divide physical networks into smaller   +, logical ones with isolated traffic from each other.[[CiteRef::Guidance - NIST SP800-82]] *Secure the environment to minimize wires susceptible to interference and limit access points to cables. Keep the ICS and IT networks separate.[[CiteRef::Guidance - NIST SP800-82]] *Monitor the network for expected outcomes and to detect unexpected states. For instance  +, an expected report does not occur may indicate reason for concern.[[CiteRef::Guidance - NIST SP800-82]] *Implement antivirus and malware detection tools to protect against threats  +, ,
*In ICS environments with dial-up modems   +, disconnect the modems when not in use or automate their disconnection after being active for a given amount of time  +, if feasible.[[CiteRef::Guidance - NIST SP800-82]] *Restrict access to both physical control and network environments with strong passwords. Consider forms of multi-factor authentication  +, ,
Mitigation/M0807  +, Mitigation/M0813  +, Mitigation/M0930  +,
C
*Restrict user privileges with Role-Based Access Control (RBAC). Configure and assign “roles” based on the principle of least privilege. Levels of access can dictate several factors   +, including the ability to view  +, use  +, ,
*Restrict access to control room(s)   +, portable devices  +, and removable media  +, ,
*Access to device configuration settings should be restricted. Be wary of improper modifications before   +, during  +, and after system implementation.[[CiteRef::Guidance - NIST SP800-82]] *Settings should be in the most restrictive mode  +, ,
*Implement Virtual Local Area Networks (VLANs) to divide physical networks into smaller   +, logical ones with isolated traffic from each other.[[CiteRef::Guidance - NIST SP800-82]] *VPNs can be used to provide secure access from an untrusted network to the ICS control network and restrict access to and from host computers.[[CiteRef::Guidance - NIST SP800-82]] *Where applicable  +, further restrict network traffic by enforcing whitelisting of known  +, ,
D
Mitigation/M0807  +, Mitigation/M0805  +, Mitigation/M0812  +
*Password authentication can be used as a barrier to Data Destruction   +, in addition to restricting user account file access according to the principle of least privilege. The default for newly created accounts should be minimal  +, to reduce adversary movement capabilities.[[CiteRef::Guidance - NIST SP800-82]] *Best password practices  +, ,
Mitigation/M0941  +, Mitigation/M0926  +, Mitigation/M0922  +, ,
*Restrict user privileges with Role-Based Access Control (RBAC). Configure and assign “roles” based on the principle of least privilege. Levels of access can dictate several factors   +, including the ability to view  +, use  +, ,
Mitigation/M0810  +, Mitigation/M0811  +, Mitigation/M0953  +
Mitigation/M0815  +
Mitigation/M0810  +, Mitigation/M0811  +, Mitigation/M0953  +
Mitigation/M0800  +, Mitigation/M0804  +, Mitigation/M0802  +, ,
*Restrict user privileges with Role-Based Access Control (RBAC). Configure and assign “roles” based on the principle of least privilege. Levels of access can dictate several factors   +, including the ability to view  +, use  +, ,