| Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
|---|---|---|---|---|---|
| PR.DS-02.01 | Data-in-transit protection | Mitigates | T1040 | Network Sniffing |
Comments
This diagnostic statement protects adversaries from being able to access data in transit over networks. Encrypting information and files by utilizing authentication protocols, such as Kerberos, can ensure web traffic that may contain credentials is protected by SSL/TLS.
|
| PR.DS-02.01 | Data-in-transit protection | Mitigates | T1565.002 | Transmitted Data Manipulation |
Comments
This diagnostic statement provides another layer of protection from adversaries trying to gain access to data that is en route to storage or other systems.
|
| PR.DS-02.01 | Data-in-transit protection | Mitigates | T1550.003 | Pass the Ticket |
Comments
This diagnostic statement provide protection from adversaries that may possibly use stolen Kerberos tickets. Various methods should be used to protect data-in-transit including encryption, password hashing, and tokenization.
|
| PR.DS-02.01 | Data-in-transit protection | Mitigates | T1550.002 | Pass the Hash |
Comments
This diagnostic statement provide protection from adversaries that may possibly utilize stolen password hashes. Various methods should be used to protect data-in-transit including encryption, password hashing, and tokenization.
|
| PR.DS-02.01 | Data-in-transit protection | Mitigates | T1550.001 | Application Access Token |
Comments
This diagnostic statement provide protection from adversaries that may possibly bypass the authentication process and use stolen tokens. Various methods should be used to protect data-in-transit including encryption, password hashing, and tokenization.
|
| PR.DS-02.01 | Data-in-transit protection | Mitigates | T1550 | Use Alternate Authentication Material |
Comments
This diagnostic statement provide protection from adversaries that may possibly attack via alternate authentication methods. Various methods should be used to protect data-in-transit including encryption, password hashing, and tokenization.
|