Version 15.1 → 16.0

Mitigations — ICS ATT&CK Changelog

Modified Mitigations

Description
Require the authentication of devices and software processes where appropriate. Devices that connect remotely to other systems should require strong authentication to prevent spoofing of communications. Furthermore, software processes should also require authentication when accessing APIs.
Details
Values Changed
Field Old value New value
modified 2023-09-20 13:12:24.527000+00:00 2024-10-14 20:31:04.927000+00:00
x_mitre_attack_spec_version 3.1.0 3.2.0
x_mitre_version 1.0 1.1
labels[2] NIST SP 800-53 Rev. 5 - IA-9 NIST SP 800-53 Rev. 5 - IA-3