This site has been deprecated in favor of https://attack.mitre.org and will remain in place until 11/1/22.
Encrypt Network Traffic
Jump to navigation
Jump to search
Encrypt Network Traffic | |
---|---|
Mitigation | |
ID | M0808 |
NIST SP 800-53 Rev. 4 | SC-8 |
IEC 62443-3-3:2013 | SR 4.1 |
IEC 62443-4-2:2019 | CR 4.1 |
Description
Utilize strong cryptographic techniques and protocols to prevent eavesdropping on network communications.
Techniques Addressed by Mitigation
Name | Use |
---|---|
Module Firmware | The encryption of firmware should be considered to prevent adversaries from identifying possible vulnerabilities within the firmware. |
Network Sniffing | Ensure that wired and/or wireless traffic is encrypted when feasible. Use best practices for authentication protocols, such as Kerberos, and ensure web traffic that may contain credentials is protected by SSL/TLS.1 |
System Firmware | The encryption of firmware should be considered to prevent adversaries from identifying possible vulnerabilities within the firmware. |
Wireless Compromise | Utilize strong cryptographic techniques and protocols to prevent eavesdropping on network communications. |
Wireless Sniffing | Utilize strong cryptographic techniques and protocols to prevent eavesdropping on network communications. 2 |