Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
PR.PS-05.03 | Email and message service protection | Mitigates | T1566.002 | Spearphishing Link |
Comments
Use anti-spoofing and email authentication mechanisms to filter messages based on validity checks of the sender domain (using SPF) and integrity of messages (using DKIM). Enabling these mechanisms within an organization (through policies such as DMARC) may enable recipients (intra-org and cross domain) to perform similar message filtering and validation.
|
PR.PS-05.03 | Email and message service protection | Mitigates | T1566.004 | Spearphishing Voice |
Comments
Anti-virus can also automatically quarantine suspicious files sent through messages via services, social media , personal webmail, etc.
|
PR.PS-05.03 | Email and message service protection | Mitigates | T1566.003 | Spearphishing via Service |
Comments
Anti-virus can also automatically quarantine suspicious files sent through messages via services, social media , personal webmail, etc.
|
PR.PS-05.03 | Email and message service protection | Mitigates | T1071.003 | Mail Protocols |
Comments
Network intrusion prevention techniques can be utilized to detect traffic for specific adversary malware, in hopes of being mitigated at the network level.
|
PR.PS-05.03 | Email and message service protection | Mitigates | T1598.003 | Spearphishing Link |
Comments
Certain software configuration techniques can be utilized to detect and isolate spearphishing messages found with malicious attachments. Email authentication mechanisms allow malicious links to be filtered, detected and blocked, enabling users not to
|
PR.PS-05.03 | Email and message service protection | Mitigates | T1598 | Phishing for Information |
Comments
Certain software configuration techniques can be utilized to detect and isolate spearphishing messages found with malicious attachments.
|
PR.PS-05.03 | Email and message service protection | Mitigates | T1204.002 | Malicious File |
Comments
Tools that detect and block and remove malware provide protection from users deceived into opening malicious attachments or files that can be found in emails (spearphishing).
|
PR.PS-05.03 | Email and message service protection | Mitigates | T1204.001 | Malicious Link |
Comments
Tools that detect and block and remove malware provide protection from users deceived into opening malicious documents, clicking on phishing links, or executing downloaded malware.
|
PR.PS-05.03 | Email and message service protection | Mitigates | T1566.002 | Spearphishing Link |
Comments
Use anti-spoofing and email authentication mechanisms to filter messages based on validity checks of the sender domain (using SPF) and integrity of messages (using DKIM). Enabling these mechanisms within an organization (through policies such as DMARC) may enable recipients (intra-org and cross domain) to perform similar message filtering and validation.
|
PR.PS-05.03 | Email and message service protection | Mitigates | T1566.004 | Spearphishing Voice |
Comments
Anti-virus can also automatically quarantine suspicious files sent through messages via services, social media , personal webmail, etc.
|
PR.PS-05.03 | Email and message service protection | Mitigates | T1566.003 | Spearphishing via Service |
Comments
Anti-virus can also automatically quarantine suspicious files sent through messages via services, social media , personal webmail, etc.
|
PR.PS-05.03 | Email and message service protection | Mitigates | T1071.003 | Mail Protocols |
Comments
Network intrusion prevention techniques can be utilized to detect traffic for specific adversary malware, in hopes of being mitigated at the network level.
|
PR.PS-05.03 | Email and message service protection | Mitigates | T1598.003 | Spearphishing Link |
Comments
Certain software configuration techniques can be utilized to detect and isolate spearphishing messages found with malicious attachments. Email authentication mechanisms allow malicious links to be filtered, detected and blocked, enabling users not to
|
PR.PS-05.03 | Email and message service protection | Mitigates | T1598 | Phishing for Information |
Comments
Certain software configuration techniques can be utilized to detect and isolate spearphishing messages found with malicious attachments.
|
PR.PS-05.03 | Email and message service protection | Mitigates | T1566 | Phishing |
Comments
Network intrusion prevention techniques can be utilized to remove malicious email attachment or link to prevent/block activity where phishing messages can be sent to users.
|
PR.PS-05.03 | Email and message service protection | Mitigates | T1566.001 | Spearphishing Attachment |
Comments
Network intrusion prevention techniques can be utilized to remove malicious email attachment or link to prevent/block activity where phishing messages can be sent to users.
|
PR.PS-05.03 | Email and message service protection | Mitigates | T1204.002 | Malicious File |
Comments
Tools that detect and block and remove malware provide protection from users deceived into opening malicious attachments or files that can be found in emails (spearphishing).
|
PR.PS-05.03 | Email and message service protection | Mitigates | T1204.001 | Malicious Link |
Comments
Tools that detect and block and remove malware provide protection from users deceived into opening malicious documents, clicking on phishing links, or executing downloaded malware.
|