Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
ID.IM-02.06 | Accurate data recovery | Mitigates | T1565.001 | Stored Data Manipulation |
Comments
This diagnostic statement highlights the critical importance of implementing remote data storage solutions as a safeguard against potential adversarial attempts to manipulate or conceal stored data (i.e. file formats, databases, stored emails, and custom file formats), which could negatively impact business operations and organizational data integrity.
|
ID.IM-02.06 | Accurate data recovery | Mitigates | T1565 | Data Manipulation |
Comments
This diagnostic statement highlights the critical importance of implementing remote data storage solutions as a safeguard against potential adversarial attempts to manipulate or conceal data, which could negatively impact business operations and organizational data integrity.
|
ID.IM-02.06 | Accurate data recovery | Mitigates | T1498.002 | Reflection Amplification |
Comments
This diagnostic statement focuses on safeguarding IP addresses from potential attacks by adversaries targeting third party servers and causing DoS attacks. Additionally, the integration of third-party services is recommended to support the development of a comprehensive business continuity plan, ensuring an effective response to such incidents.
|
ID.IM-02.06 | Accurate data recovery | Mitigates | T1498.001 | Direct Network Flood |
Comments
This diagnostic statement focuses on safeguarding IP addresses from potential attacks by adversaries, including Network Denial of Service (DoS) attacks targeting the availability and functionality of networks. Additionally, the integration of third-party services is recommended to support the development of a comprehensive business continuity plan, ensuring an effective response to such incidents.
|
ID.IM-02.06 | Accurate data recovery | Mitigates | T1498 | Network Denial of Service |
Comments
This diagnostic statement focuses on safeguarding IP addresses from potential attacks by adversaries, including Network Denial of Service (DoS) attacks targeting websites, email services, and web-based applications. Additionally, the integration of third-party services is recommended to support the development of a comprehensive business continuity plan, ensuring an effective response to such incidents.
|
ID.IM-02.06 | Accurate data recovery | Mitigates | T1490 | Inhibit System Recovery |
Comments
This diagnostic statement emphasizes the facilitation of data recovery through the implementation of robust data backup strategies, comprehensive disaster recovery plans, and effective business continuity frameworks, specifically designed to address scenarios in which adversaries may attempt to hinder the recovery of a compromised system.
|
ID.IM-02.06 | Accurate data recovery | Mitigates | T1486 | Data Encrypted for Impact |
Comments
This diagnostic statement emphasizes the facilitation of data recovery through the implementation of robust data backup strategies, comprehensive disaster recovery plans, and effective business continuity frameworks, specifically designed to address scenarios in which adversaries may attempt to target data on encrypted systems by using ransomware.
|
ID.IM-02.06 | Accurate data recovery | Mitigates | T1485.001 | Lifecycle-Triggered Deletion |
Comments
This diagnostic statement emphasizes the facilitation of data recovery through the implementation of robust data backup strategies, comprehensive disaster recovery plans, and effective business continuity frameworks, specifically designed to address scenarios in which adversaries may attempt to modify policies of cloud storage and data within it.
|
ID.IM-02.06 | Accurate data recovery | Mitigates | T1485 | Data Destruction |
Comments
This diagnostic statement emphasizes the facilitation of data recovery through the implementation of robust data backup strategies, comprehensive disaster recovery plans, and effective business continuity frameworks, specifically designed to address scenarios in which adversaries attempt to destroy data and/or files on systems found within a large network.
|
ID.IM-02.06 | Accurate data recovery | Mitigates | T1561.002 | Disk Structure Wipe |
Comments
This diagnostic statement emphasizes the facilitation of data recovery through the implementation of robust data backup strategies, comprehensive disaster recovery plans, and effective business continuity frameworks, specifically designed to address scenarios in which adversaries attempt to erase disk data structures on hard dives or within networks.
|
ID.IM-02.06 | Accurate data recovery | Mitigates | T1561.001 | Disk Content Wipe |
Comments
This diagnostic statement emphasizes the facilitation of data recovery through the implementation of robust data backup strategies, comprehensive disaster recovery plans, and effective business continuity frameworks, specifically designed to address scenarios in which adversaries attempt to erase content found on storage devices on systems or within networks.
|
ID.IM-02.06 | Accurate data recovery | Mitigates | T1561 | Disk Wipe |
Comments
This diagnostic statement emphasizes the facilitation of data recovery through the implementation of robust data backup strategies, comprehensive disaster recovery plans, and effective business continuity frameworks, specifically designed to address scenarios in which adversaries attempt to corrupt raw disk data on systems or within networks.
|
ID.IM-02.06 | Accurate data recovery | Mitigates | T1491.002 | External Defacement |
Comments
This diagnostic statement emphasizes the importance of facilitating data recovery through the implementation of robust data backup strategies, comprehensive disaster recovery plans, and effective business continuity frameworks, aimed at mitigating the risks posed by potential adversarial attempts to compromise or manipulate organization's content and systems externally by targeting users through messages or propaganda.
|
ID.IM-02.06 | Accurate data recovery | Mitigates | T1491.001 | Internal Defacement |
Comments
This diagnostic statement emphasizes the importance of facilitating data recovery through the implementation of robust data backup strategies, comprehensive disaster recovery plans, and effective business continuity frameworks, aimed at mitigating the risks posed by potential adversarial attempts to compromise or manipulate content internally within an organization's network.
|
ID.IM-02.06 | Accurate data recovery | Mitigates | T1491 | Defacement |
Comments
This diagnostic statement emphasizes the importance of facilitating data recovery through the implementation of robust data backup strategies, comprehensive disaster recovery plans, and effective business continuity frameworks, aimed at mitigating the risks posed by potential adversarial attempts to compromise or manipulate content within an enterprise network.
|