CRI Profile DE.CM-01.01

The organization deploys intrusion detection and intrusion prevention capabilities to detect and prevent a potential network intrusion in its early stages for timely containment and recovery.

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
DE.CM-01.01 Intrusion detection and prevention Mitigates T1572 Protocol Tunneling
Comments
This diagnostic statement protects adversaries from using tunneling to encapsulate a protocol within another protocol. Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1090.002 External Proxy
Comments
This diagnostic statement protects adversaries from infiltrating external proxies and taking over control of traffic between systems. Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1090.001 Internal Proxy
Comments
This diagnostic statement protects adversaries from infiltrating internal proxies and taking over control of traffic between systems. Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1090 Proxy
Comments
This diagnostic statement protects adversaries from redirecting network traffic between systems by infiltrating connection proxies. Traffic to known anonymity networks and C2 infrastructure can be blocked through the use of network allow and block lists.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1102.003 One-Way Communication
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware that can be used to mitigate malicious activity and identify adversaries that use web services to obfuscate domains or IP addresses over web service channel.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1102.002 Bidirectional Communication
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware that can be used to mitigate malicious activity and identify adversaries that use web services to obfuscate domains or IP addresses over web service channel.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1102.001 Dead Drop Resolver
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware that can be used to mitigate malicious activity and identify adversaries that use web services to obfuscate domains or IP addresses.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1102 Web Service
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate malicious activity and identify adversaries that can relay data from a compromised systems through websites, cloud service, or social media.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1204.003 Malicious Image
Comments
In order to protect users from being victims of social engineering attacks, network intrusion prevention techniques can be used to scan and block malicious images so those images can't lead to malicious code being executed.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1204.001 Malicious Link
Comments
In order to protect users from being victims of social engineering attacks, network intrusion prevention techniques can be used to scan and block malicious downloads and malicious activity.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1204 User Execution
Comments
In order to protect users from being victims of social engineering attacks, network intrusion prevention techniques can be used to scan and block malicious code from malicious downloads and malicious activity.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1566.001 Spearphishing Attachment
Comments
This diagnostic statement utilizes the tools such as network intrusion prevent systems to identify, scan and block malicious email attachments that can be clicked on by users in their emails. Also, anti-virus can be used to quarantine suspicious files.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1221 Template Injection
Comments
Network/Host intrusion prevention systems, antivirus, and detonation chambers can be employed to prevent documents from fetching and/or executing malicious payloads that adversaries can steal in document templates.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1566 Phishing
Comments
This diagnostic statement utilizes the tools such as network intrusion prevent systems to identify, scan and block malicious email or links that can be clicked on by users in their emails. Also, anti-virus can be used to quarantine suspicious files.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1048 Exfiltration Over Alternative Protocol
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some activity at the network level, specifically adversaries known to steal data and/or encrypt or obfuscate alternate channels.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1573.002 Asymmetric Cryptography
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some activity at the network level, specifically adversaries known to conceal C2 traffic with asymmetric encryption algorithms.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1573.001 Symmetric Cryptography
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some activity at the network level, specifically adversaries known to conceal C2 traffic with symmetric encryption algorithms.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1573 Encrypted Channel
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some obfuscation (command and control traffic) activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1568.002 Domain Generation Algorithms
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some obfuscation (command and control) activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1568 Dynamic Resolution
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some obfuscation (command and control) activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1030 Data Transfer Size Limits
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some obfuscation activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1001.003 Protocol or Service Impersonation
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some obfuscation activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1001.002 Steganography
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some obfuscation activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1001.001 Junk Data
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some obfuscation activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1001 Data Obfuscation
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some obfuscation command and control activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1132.002 Non-Standard Encoding
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1132.001 Standard Encoding
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1132 Data Encoding
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1071.005 Publish/Subscribe Protocols
Comments
This diagnostic statement protects against adversaries that may try to utilize different protocols to abuse packets produced from these protocols. Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1071.004 DNS
Comments
This diagnostic statement protects against adversaries that may try to utilize DNS protocol to abuse packets produced from these protocols. Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1071.003 Mail Protocols
Comments
This diagnostic statement protects against adversaries that may try to utilize different protocols, such as SMPT/S, POP3/S and IMAP, to abuse packets produced from these protocols. Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1071.002 File Transfer Protocols
Comments
This diagnostic statement protects against adversaries that may try to utilize different protocols, such as SMB, FTP, FTPS, and TFPT, to abuse packets produced from these protocols. Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1071.001 Web Protocols
Comments
This diagnostic statement protects against adversaries that may try to utilize different protocols, such as HTTPS and web socket, to blend in with existing traffic. Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1071 Application Layer Protocol
Comments
This diagnostic statement protects against adversaries that may try to utilize different protocols, such as web browsing, transferring files, email, from attacking at the OSI level. Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1557.004 Evil Twin
Comments
Implementing methods similar to Wireless Intrusion prevention systems (WIPS) can identify and prevent adversary in the middle activity
DE.CM-01.01 Intrusion detection and prevention Mitigates T1557.003 DHCP Spoofing
Comments
The use of network intrusion detection and prevention systems can identify and possibly bock traffic patterns, indicative of AiTM activity. If so, these patterns can be mitigated at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1557.002 ARP Cache Poisoning
Comments
The use of network intrusion detection and prevention systems can identify and possibly bock traffic patterns, indicative of AiTM activity. If so, these patterns can be mitigated at the network level, enabling to block adversaries from poisoning ARP caches.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1557.001 LLMNR/NBT-NS Poisoning and SMB Relay
Comments
The use of network intrusion detection and prevention systems can identify and possibly bock traffic patterns, indicative of AiTM activity. If so, these patterns can be mitigated at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1557 Adversary-in-the-Middle
Comments
The use of network intrusion detection and prevention systems can identify and possibly bock traffic patterns, indicative of AiTM activity. If so, these patterns can be mitigated at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1036.008 Masquerade File Type
Comments
Implementing methods similar to Host Intrusion prevention (HIPS) can identify and prevent execution of malicious files and its metadata manipulated by adversaries.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1036 Masquerading
Comments
Implementing methods similar to Host Intrusion prevention (HIPS) can identify and prevent execution of malicious files and its metadata manipulated by adversaries.