CRI Profile Detect: Continuous Monitoring Capability Group

All Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
DE.CM-03.03 Privileged account monitoring Mitigates T1606.001 Web Cookies
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1543.003 Windows Service
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1543.004 Launch Daemon
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1543.002 Systemd Service
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1098.004 SSH Authorized Keys
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1098.005 Device Registration
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1098.006 Additional Container Cluster Roles
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1098.007 Additional Local or Domain Groups
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1078 Valid Accounts
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-01.05 Website and service blocking Mitigates T1204.001 Malicious Link
Comments
This diagnostic statement protects user execution through the implementation of tools and measures to block unknown or unused files in transit.
DE.CM-09.01 Software and data integrity checking Mitigates T1003 OS Credential Dumping
Comments
This diagnostic statement protects against OS Credential Dumping through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1003.001 LSASS Memory
Comments
This diagnostic statement protects against LSASS Memory through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1036 Masquerading
Comments
This diagnostic statement protects against Masquerading through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1036.001 Invalid Code Signature
Comments
This diagnostic statement protects against Invalid Code Signature through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1036.005 Match Legitimate Name or Location
Comments
This diagnostic statement protects against Match Legitimate Name or Location through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1059 Command and Scripting Interpreter
Comments
This diagnostic statement protects against Command and Scripting Interpreter through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1059.001 PowerShell
Comments
This diagnostic statement protects against PowerShell through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1059.002 AppleScript
Comments
This diagnostic statement protects against AppleScript through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1127 Trusted Developer Utilities Proxy Execution
Comments
This diagnostic statement protects against Trusted Developer Utilities Proxy Execution through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1127.002 ClickOnce
Comments
This diagnostic statement protects against ClickOnce through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1176 Browser Extensions
Comments
This diagnostic statement protects against Browser Extensions through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1195 Supply Chain Compromise
Comments
This diagnostic statement protects against Supply Chain Compromise through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1195.001 Compromise Software Dependencies and Development Tools
Comments
This diagnostic statement protects against Compromise Software Dependencies and Development Tools through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1204.003 Malicious Image
Comments
This diagnostic statement protects against Malicious Image through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1213.004 Customer Relationship Management Software
Comments
This diagnostic statement protects against Customer Relationship Management Software through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1495 Firmware Corruption
Comments
This diagnostic statement protects against Firmware Corruption through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1505 Server Software Component
Comments
This diagnostic statement protects against Server Software Component through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1505.001 SQL Stored Procedures
Comments
This diagnostic statement protects against SQL Stored Procedures through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1505.002 Transport Agent
Comments
This diagnostic statement protects against Transport Agent through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1505.004 IIS Components
Comments
This diagnostic statement protects against IIS Components through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1525 Implant Internal Image
Comments
This diagnostic statement protects against Implant Internal Image through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1537 Transfer Data to Cloud Account
Comments
This diagnostic statement protects against Transfer Data to Cloud Account through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1539 Steal Web Session Cookie
Comments
This diagnostic statement protects against Steal Web Session Cookie through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1542 Pre-OS Boot
Comments
This diagnostic statement protects against Pre-OS Boot through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1542.001 System Firmware
Comments
This diagnostic statement protects against System Firmware through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1542.003 Bootkit
Comments
This diagnostic statement protects against Bootkit through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1542.004 ROMMONkit
Comments
This diagnostic statement protects against ROMMONkit through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1542.005 TFTP Boot
Comments
This diagnostic statement protects against TFTP Boot through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1543 Create or Modify System Process
Comments
This diagnostic statement protects against Create or Modify System Process through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1543.002 Systemd Service
Comments
This diagnostic statement protects against Systemd Service through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1543.003 Windows Service
Comments
This diagnostic statement protects against Windows Service through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1546.006 LC_LOAD_DYLIB Addition
Comments
This diagnostic statement protects against LC_LOAD_DYLIB Addition through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1546.013 PowerShell Profile
Comments
This diagnostic statement protects against PowerShell Profile through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1547.002 Authentication Package
Comments
This diagnostic statement protects against Authentication Package through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1547.005 Security Support Provider
Comments
This diagnostic statement protects against Security Support Provider through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1547.008 LSASS Driver
Comments
This diagnostic statement protects against LSASS Driver through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1547.013 XDG Autostart Entries
Comments
This diagnostic statement protects against XDG Autostart Entries through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1553.006 Code Signing Policy Modification
Comments
This diagnostic statement protects against Code Signing Policy Modification through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1554 Compromise Host Software Binary
Comments
This diagnostic statement protects against Compromise Host Software Binary through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1556 Modify Authentication Process
Comments
This diagnostic statement protects against Modify Authentication Process through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1556.001 Domain Controller Authentication
Comments
This diagnostic statement protects against Domain Controller Authentication through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1574 Hijack Execution Flow
Comments
This diagnostic statement protects against Hijack Execution Flow through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1574.001 DLL Search Order Hijacking
Comments
This diagnostic statement protects against DLL Search Order Hijacking through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1601 Modify System Image
Comments
This diagnostic statement protects against Modify System Image through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1601.001 Patch System Image
Comments
This diagnostic statement protects against Patch System Image through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-09.01 Software and data integrity checking Mitigates T1601.002 Downgrade System Image
Comments
This diagnostic statement protects against Downgrade System Image through the use of verifying integrity of software/firmware, loading software that is trusted, ensuring privileged process integrity and checking software signatures.
DE.CM-06.02 Third-party access monitoring Mitigates T1548 Abuse Elevation Control Mechanism
Comments
This diagnostic statement protects against Abuse Elevation Control Mechanism through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1548.002 Bypass User Account Control
Comments
This diagnostic statement protects against Bypass User Account Control through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1548.003 Sudo and Sudo Caching
Comments
This diagnostic statement protects against Sudo and Sudo Caching through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1548.006 TCC Manipulation
Comments
This diagnostic statement protects against TCC Manipulation through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1134 Access Token Manipulation
Comments
This diagnostic statement protects against Access Token Manipulation through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1134.001 Token Impersonation/Theft
Comments
This diagnostic statement protects against Token Impersonation/Theft through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1134.002 Create Process with Token
Comments
This diagnostic statement protects against Create Process with Token through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1134.003 Make and Impersonate Token
Comments
This diagnostic statement protects against Make and Impersonate Token through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1098 Account Manipulation
Comments
This diagnostic statement protects against Account Manipulation through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1098.001 Additional Cloud Credentials
Comments
This diagnostic statement protects against Additional Cloud Credentials through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1098.002 Additional Email Delegate Permissions
Comments
This diagnostic statement protects against Additional Email Delegate Permissions through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1098.003 Additional Cloud Roles
Comments
This diagnostic statement protects against Additional Cloud Roles through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1651 Cloud Administration Command
Comments
This diagnostic statement protects against Cloud Administration Command through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1059.001 PowerShell
Comments
This diagnostic statement protects against PowerShell through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1059.008 Network Device CLI
Comments
This diagnostic statement protects against Network Device CLI through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1059.009 Cloud API
Comments
This diagnostic statement protects against Cloud API through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1609 Container Administration Command
Comments
This diagnostic statement protects against Container Administration Command through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1136.001 Local Account
Comments
This diagnostic statement protects against Local Account through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1136.002 Domain Account
Comments
This diagnostic statement protects against Domain Account through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1136.003 Cloud Account
Comments
This diagnostic statement protects against Cloud Account through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1555 Credentials from Password Stores
Comments
This diagnostic statement protects against Credentials from Password Stores through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1555.006 Cloud Secrets Management Stores
Comments
This diagnostic statement protects against Cloud Secrets Management Stores through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1484 Domain or Tenant Policy Modification
Comments
This diagnostic statement protects against Domain or Tenant Policy Modification through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1484.002 Trust Modification
Comments
This diagnostic statement protects against Trust Modification through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1190 Exploit Public-Facing Application
Comments
This diagnostic statement protects against Exploit Public-Facing Application through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1210 Exploitation of Remote Services
Comments
This diagnostic statement protects against Exploitation of Remote Services through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1606 Forge Web Credentials
Comments
This diagnostic statement protects against Forge Web Credentials through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1606.002 SAML Tokens
Comments
This diagnostic statement protects against SAML Tokens through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1056.003 Web Portal Capture
Comments
This diagnostic statement protects against Web Portal Capture through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1556 Modify Authentication Process
Comments
This diagnostic statement protects against Modify Authentication Process through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1556.001 Domain Controller Authentication
Comments
This diagnostic statement protects against Domain Controller Authentication through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1556.003 Pluggable Authentication Modules
Comments
This diagnostic statement protects against Pluggable Authentication Modules through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1556.004 Network Device Authentication
Comments
This diagnostic statement protects against Network Device Authentication through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1556.007 Hybrid Identity
Comments
This diagnostic statement protects against Hybrid Identity through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1599 Network Boundary Bridging
Comments
This diagnostic statement protects against Network Boundary Bridging through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1599.001 Network Address Translation Traversal
Comments
This diagnostic statement protects against Network Address Translation Traversal through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1003 OS Credential Dumping
Comments
This diagnostic statement protects against OS Credential Dumping through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1003.001 LSASS Memory
Comments
This diagnostic statement protects against LSASS Memory through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1003.002 Security Account Manager
Comments
This diagnostic statement protects against Security Account Manager through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1003.003 NTDS
Comments
This diagnostic statement protects against NTDS through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1003.004 LSA Secrets
Comments
This diagnostic statement protects against LSA Secrets through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1003.005 Cached Domain Credentials
Comments
This diagnostic statement protects against Cached Domain Credentials through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1003.006 DCSync
Comments
This diagnostic statement protects against DCSync through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1003.007 Proc Filesystem
Comments
This diagnostic statement protects against Proc Filesystem through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1003.008 /etc/passwd and /etc/shadow
Comments
This diagnostic statement protects against /etc/passwd and /etc/shadow through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1563 Remote Service Session Hijacking
Comments
This diagnostic statement protects against Remote Service Session Hijacking through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1563.001 SSH Hijacking
Comments
This diagnostic statement protects against SSH Hijacking through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1563.002 RDP Hijacking
Comments
This diagnostic statement protects against RDP Hijacking through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1021 Remote Services
Comments
This diagnostic statement protects against Remote Services through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1021.001 Remote Desktop Protocol
Comments
This diagnostic statement protects against Remote Desktop Protocol through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1021.002 SMB/Windows Admin Shares
Comments
This diagnostic statement protects against SMB/Windows Admin Shares through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1021.003 Distributed Component Object Model
Comments
This diagnostic statement protects against Distributed Component Object Model through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1021.006 Windows Remote Management
Comments
This diagnostic statement protects against Windows Remote Management through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1021.007 Cloud Services
Comments
This diagnostic statement protects against Cloud Services through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1505 Server Software Component
Comments
This diagnostic statement protects against Server Software Component through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1072 Software Deployment Tools
Comments
This diagnostic statement protects against Software Deployment Tools through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1558 Steal or Forge Kerberos Tickets
Comments
This diagnostic statement protects against Steal or Forge Kerberos Tickets through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1558.001 Golden Ticket
Comments
This diagnostic statement protects against Golden Ticket through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1558.002 Silver Ticket
Comments
This diagnostic statement protects against Silver Ticket through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1558.003 Kerberoasting
Comments
This diagnostic statement protects against Kerberoasting through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1218 System Binary Proxy Execution
Comments
This diagnostic statement protects against System Binary Proxy Execution through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1569 System Services
Comments
This diagnostic statement protects against System Services through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1552 Unsecured Credentials
Comments
This diagnostic statement protects against Unsecured Credentials through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1552.002 Credentials in Registry
Comments
This diagnostic statement protects against Credentials in Registry through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1552.007 Container API
Comments
This diagnostic statement protects against Container API through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1550 Use Alternate Authentication Material
Comments
This diagnostic statement protects against Use Alternate Authentication Material through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1550.002 Pass the Hash
Comments
This diagnostic statement protects against Pass the Hash through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1550.003 Pass the Ticket
Comments
This diagnostic statement protects against Pass the Ticket through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1078 Valid Accounts
Comments
This diagnostic statement protects against Valid Accounts through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1078.002 Domain Accounts
Comments
This diagnostic statement protects against Domain Accounts through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1078.003 Local Accounts
Comments
This diagnostic statement protects against Local Accounts through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1078.004 Cloud Accounts
Comments
This diagnostic statement protects against Cloud Accounts through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-06.02 Third-party access monitoring Mitigates T1047 Windows Management Instrumentation
Comments
This diagnostic statement protects against Windows Management Instrumentation through the use of privileged account management. Employing auditing, privilege access management, and just in time access protects against adversaries trying to obtain illicit access to critical systems.
DE.CM-09.02 Hardware integrity checking Mitigates T1562.001 Disable or Modify Tools
Comments
This diagnostic statement provides protection from Disable or Modify Tools through the implementation of integrity checking mechanisms. For example, integrity checking mechanisms to verify the operating system, software, firmware, and information integrity before loading it prevents abuse by a threat actor.
DE.CM-09.02 Hardware integrity checking Mitigates T1091 Replication Through Removable Media
Comments
This diagnostic statement provides protection from Replication Through Removable Media through the implementation of integrity checking mechanisms. For example, integrity checking mechanisms to verify the operating system, software, firmware, and information integrity before loading it prevents abuse by a threat actor.
DE.CM-09.02 Hardware integrity checking Mitigates T1542 Pre-OS Boot
Comments
This diagnostic statement provides protection from Pre-OS Boot through the implementation of integrity checking mechanisms. For example, integrity checking mechanisms to verify the operating system, software, firmware, and information integrity before loading it prevents abuse by a threat actor.
DE.CM-09.02 Hardware integrity checking Mitigates T1542.002 Component Firmware
Comments
This diagnostic statement provides protection from Component Firmware through the implementation of integrity checking mechanisms. For example, integrity checking mechanisms to verify the operating system, software, firmware, and information integrity before loading it prevents abuse by a threat actor.
DE.CM-09.02 Hardware integrity checking Mitigates T1600.002 Disable Crypto Hardware
Comments
This diagnostic statement provides protection from Disable Crypto Hardware through the implementation of integrity checking mechanisms. For example, integrity checking mechanisms to verify the operating system, software, firmware, and information integrity before loading it prevents abuse by a threat actor.
DE.CM-09.02 Hardware integrity checking Mitigates T1495 Firmware Corruption
Comments
This diagnostic statement provides protection from Firmware Corruption through the implementation of integrity checking mechanisms. For example, integrity checking mechanisms to verify the operating system, software, firmware, and information integrity before loading it prevents abuse by a threat actor.
DE.CM-09.02 Hardware integrity checking Mitigates T1542.001 System Firmware
Comments
This diagnostic statement provides protection from System Firmware through the implementation of integrity checking mechanisms. For example, integrity checking mechanisms to verify the operating system, software, firmware, and information integrity before loading it prevents abuse by a threat actor.
DE.CM-09.02 Hardware integrity checking Mitigates T1195.003 Compromise Hardware Supply Chain
Comments
This diagnostic statement provides protection from Compromise Hardware Supply Chain through the implementation of integrity checking mechanisms. For example, integrity checking mechanisms to verify the operating system, software, firmware, and information integrity before loading it prevents abuse by a threat actor.
DE.CM-01.04 Unauthorized device connection Mitigates T1200 Hardware Additions
Comments
This diagnostic statement provides protection from hardware additions through the use of tools to detect and block the use of unauthorized or unknown devices and accessories by endpoint security configuration and monitoring.
DE.CM-01.04 Unauthorized device connection Mitigates T1052 Exfiltration Over Physical Medium
Comments
This diagnostic statement provides protection from exfiltration of data via a physical medium, such as a removable drive by using tools to detect and block the use of unauthorized devices.
DE.CM-01.04 Unauthorized device connection Mitigates T1052.001 Exfiltration over USB
Comments
This diagnostic statement provides protection from exfiltration of data via a physical medium, such as a removable drive by using tools to detect and block the use of unauthorized devices.
DE.CM-01.03 Unauthorized network connections and data transfers Mitigates T1102 Web Service
Comments
This diagnostic statement provides protection from Web Service by using tools to detect and block the use of unauthorized devices and connections to prevent abuse by adversaries.
DE.CM-01.03 Unauthorized network connections and data transfers Mitigates T1572 Protocol Tunneling
Comments
This diagnostic statement provides protection from Protocol Tunneling by using tools to detect and block the use of unauthorized devices and connections to prevent abuse by adversaries.
DE.CM-01.03 Unauthorized network connections and data transfers Mitigates T1571 Non-Standard Port
Comments
This diagnostic statement provides protection from Non-Standard Port by using tools to detect and block the use of unauthorized devices and connections to prevent abuse by adversaries.
DE.CM-01.03 Unauthorized network connections and data transfers Mitigates T1104 Multi-Stage Channels
Comments
This diagnostic statement provides protection from Multi-Stage Channels by using tools to detect and block the use of unauthorized devices and connections to prevent abuse by adversaries.
DE.CM-01.03 Unauthorized network connections and data transfers Mitigates T1008 Fallback Channels
Comments
This diagnostic statement provides protection from Fallback Channels by using tools to detect and block the use of unauthorized devices and connections to prevent abuse by adversaries.
DE.CM-01.03 Unauthorized network connections and data transfers Mitigates T1041 Exfiltration Over C2 Channel
Comments
This diagnostic statement provides protection from Exfiltration Over C2 Channel by using tools to detect and block the use of unauthorized devices and connections to prevent abuse by adversaries.
DE.CM-01.03 Unauthorized network connections and data transfers Mitigates T1090 Proxy
Comments
This diagnostic statement provides protection from Proxy by using tools to detect and block the use of unauthorized devices and connections to prevent abuse by adversaries.
DE.CM-01.03 Unauthorized network connections and data transfers Mitigates T1030 Data Transfer Size Limits
Comments
This diagnostic statement provides protection from Data Transfer Size Limits by using tools to detect and block the use of unauthorized devices and connections to prevent abuse by adversaries.
DE.CM-01.03 Unauthorized network connections and data transfers Mitigates T1095 Non-Application Layer Protocol
Comments
This diagnostic statement provides protection from Non-Application Layer Protocol by using tools to detect and block the use of unauthorized devices and connections to prevent abuse by adversaries.
DE.CM-01.03 Unauthorized network connections and data transfers Mitigates T1599 Network Boundary Bridging
Comments
This diagnostic statement provides protection from Network Boundary Bridging by using tools to detect and block the use of unauthorized devices and connections to prevent abuse by adversaries.
DE.CM-01.03 Unauthorized network connections and data transfers Mitigates T1048.003 Exfiltration Over Unencrypted Non-C2 Protocol
Comments
This diagnostic statement provides protection from Exfiltration Over Unencrypted Non-C2 Protocol by using tools to detect and block the use of unauthorized devices and connections to prevent abuse by adversaries.
DE.CM-01.03 Unauthorized network connections and data transfers Mitigates T1048.002 Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
Comments
This diagnostic statement provides protection from Exfiltration Over Asymmetric Encrypted Non-C2 Protocol by using tools to detect and block the use of unauthorized devices and connections to prevent abuse by adversaries.
DE.CM-01.03 Unauthorized network connections and data transfers Mitigates T1048.001 Exfiltration Over Symmetric Encrypted Non-C2 Protocol
Comments
This diagnostic statement provides protection from Exfiltration Over Symmetric Encrypted Non-C2 Protocol by using tools to detect and block the use of unauthorized devices and connections to prevent abuse by adversaries.
DE.CM-01.03 Unauthorized network connections and data transfers Mitigates T1048 Exfiltration Over Alternative Protocol
Comments
This diagnostic statement provides protection from Exfiltration Over Alternative Protocol by using tools to detect and block the use of unauthorized devices and connections to prevent abuse by adversaries.
DE.CM-09.03 Unauthorized software, hardware, or configuration changes Mitigates T1543 Create or Modify System Process
Comments
This Diagnostic Statement addresses measures for managing configuration integrity and unauthorized changes that can mitigate risks associated with adversary techniques attempting to make changes to how the hardware, software, and firmware operates.
DE.CM-09.03 Unauthorized software, hardware, or configuration changes Mitigates T1601 Modify System Image
Comments
This Diagnostic Statement addresses measures for managing configuration integrity and unauthorized changes that can mitigate risks associated with adversary techniques attempting to make changes to how the hardware, software, and firmware operates.
DE.CM-09.03 Unauthorized software, hardware, or configuration changes Mitigates T1556 Modify Authentication Process
Comments
This Diagnostic Statement addresses measures for managing configuration integrity and unauthorized changes that can mitigate risks associated with adversary techniques attempting to make changes to how the hardware, software, and firmware operates.
DE.CM-09.03 Unauthorized software, hardware, or configuration changes Mitigates T1542.002 Component Firmware
Comments
This Diagnostic Statement addresses measures for managing configuration integrity and unauthorized changes that can mitigate risks associated with adversary techniques attempting to make changes to how the hardware, software, and firmware operates.
DE.CM-09.03 Unauthorized software, hardware, or configuration changes Mitigates T1542.001 System Firmware
Comments
This Diagnostic Statement addresses measures for managing configuration integrity and unauthorized changes that can mitigate risks associated with adversary techniques attempting to make changes to how the hardware, software, and firmware operates.
DE.CM-09.03 Unauthorized software, hardware, or configuration changes Mitigates T1495 Firmware Corruption
Comments
This Diagnostic Statement addresses measures for managing configuration integrity and unauthorized changes that can mitigate risks associated with adversary techniques attempting to make changes to how the hardware, software, and firmware operates.
DE.CM-09.03 Unauthorized software, hardware, or configuration changes Mitigates T1562 Impair Defenses
Comments
This Diagnostic Statement addresses measures for managing configuration integrity and unauthorized changes that can mitigate risks associated with adversary techniques attempting to make changes to how the hardware, software, and firmware operates.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1572 Protocol Tunneling
Comments
This diagnostic statement protects adversaries from using tunneling to encapsulate a protocol within another protocol. Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1090.002 External Proxy
Comments
This diagnostic statement protects adversaries from infiltrating external proxies and taking over control of traffic between systems. Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1090.001 Internal Proxy
Comments
This diagnostic statement protects adversaries from infiltrating internal proxies and taking over control of traffic between systems. Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1090 Proxy
Comments
This diagnostic statement protects adversaries from redirecting network traffic between systems by infiltrating connection proxies. Traffic to known anonymity networks and C2 infrastructure can be blocked through the use of network allow and block lists.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1102.003 One-Way Communication
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware that can be used to mitigate malicious activity and identify adversaries that use web services to obfuscate domains or IP addresses over web service channel.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1102.002 Bidirectional Communication
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware that can be used to mitigate malicious activity and identify adversaries that use web services to obfuscate domains or IP addresses over web service channel.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1102.001 Dead Drop Resolver
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware that can be used to mitigate malicious activity and identify adversaries that use web services to obfuscate domains or IP addresses.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1102 Web Service
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate malicious activity and identify adversaries that can relay data from a compromised systems through websites, cloud service, or social media.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1204.003 Malicious Image
Comments
In order to protect users from being victims of social engineering attacks, network intrusion prevention techniques can be used to scan and block malicious images so those images can't lead to malicious code being executed.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1204.001 Malicious Link
Comments
In order to protect users from being victims of social engineering attacks, network intrusion prevention techniques can be used to scan and block malicious downloads and malicious activity.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1204 User Execution
Comments
In order to protect users from being victims of social engineering attacks, network intrusion prevention techniques can be used to scan and block malicious code from malicious downloads and malicious activity.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1566.001 Spearphishing Attachment
Comments
This diagnostic statement utilizes the tools such as network intrusion prevent systems to identify, scan and block malicious email attachments that can be clicked on by users in their emails. Also, anti-virus can be used to quarantine suspicious files.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1221 Template Injection
Comments
Network/Host intrusion prevention systems, antivirus, and detonation chambers can be employed to prevent documents from fetching and/or executing malicious payloads that adversaries can steal in document templates.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1566 Phishing
Comments
This diagnostic statement utilizes the tools such as network intrusion prevent systems to identify, scan and block malicious email or links that can be clicked on by users in their emails. Also, anti-virus can be used to quarantine suspicious files.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1048 Exfiltration Over Alternative Protocol
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some activity at the network level, specifically adversaries known to steal data and/or encrypt or obfuscate alternate channels.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1573.002 Asymmetric Cryptography
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some activity at the network level, specifically adversaries known to conceal C2 traffic with asymmetric encryption algorithms.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1573.001 Symmetric Cryptography
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some activity at the network level, specifically adversaries known to conceal C2 traffic with symmetric encryption algorithms.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1573 Encrypted Channel
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some obfuscation (command and control traffic) activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1568.002 Domain Generation Algorithms
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some obfuscation (command and control) activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1568 Dynamic Resolution
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some obfuscation (command and control) activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1030 Data Transfer Size Limits
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some obfuscation activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1001.003 Protocol or Service Impersonation
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some obfuscation activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1001.002 Steganography
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some obfuscation activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1001.001 Junk Data
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some obfuscation activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1001 Data Obfuscation
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate some obfuscation command and control activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1132.002 Non-Standard Encoding
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1132.001 Standard Encoding
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1132 Data Encoding
Comments
Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1071.005 Publish/Subscribe Protocols
Comments
This diagnostic statement protects against adversaries that may try to utilize different protocols to abuse packets produced from these protocols. Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1071.004 DNS
Comments
This diagnostic statement protects against adversaries that may try to utilize DNS protocol to abuse packets produced from these protocols. Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1071.003 Mail Protocols
Comments
This diagnostic statement protects against adversaries that may try to utilize different protocols, such as SMPT/S, POP3/S and IMAP, to abuse packets produced from these protocols. Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1071.002 File Transfer Protocols
Comments
This diagnostic statement protects against adversaries that may try to utilize different protocols, such as SMB, FTP, FTPS, and TFPT, to abuse packets produced from these protocols. Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1071.001 Web Protocols
Comments
This diagnostic statement protects against adversaries that may try to utilize different protocols, such as HTTPS and web socket, to blend in with existing traffic. Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1071 Application Layer Protocol
Comments
This diagnostic statement protects against adversaries that may try to utilize different protocols, such as web browsing, transferring files, email, from attacking at the OSI level. Network intrusion detection and prevention systems that use network signatures to identify traffic for specific adversary malware can be used to mitigate activity at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1557.004 Evil Twin
Comments
Implementing methods similar to Wireless Intrusion prevention systems (WIPS) can identify and prevent adversary in the middle activity
DE.CM-01.01 Intrusion detection and prevention Mitigates T1557.003 DHCP Spoofing
Comments
The use of network intrusion detection and prevention systems can identify and possibly bock traffic patterns, indicative of AiTM activity. If so, these patterns can be mitigated at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1557.002 ARP Cache Poisoning
Comments
The use of network intrusion detection and prevention systems can identify and possibly bock traffic patterns, indicative of AiTM activity. If so, these patterns can be mitigated at the network level, enabling to block adversaries from poisoning ARP caches.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1557.001 LLMNR/NBT-NS Poisoning and SMB Relay
Comments
The use of network intrusion detection and prevention systems can identify and possibly bock traffic patterns, indicative of AiTM activity. If so, these patterns can be mitigated at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1557 Adversary-in-the-Middle
Comments
The use of network intrusion detection and prevention systems can identify and possibly bock traffic patterns, indicative of AiTM activity. If so, these patterns can be mitigated at the network level.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1036.008 Masquerade File Type
Comments
Implementing methods similar to Host Intrusion prevention (HIPS) can identify and prevent execution of malicious files and its metadata manipulated by adversaries.
DE.CM-01.01 Intrusion detection and prevention Mitigates T1036 Masquerading
Comments
Implementing methods similar to Host Intrusion prevention (HIPS) can identify and prevent execution of malicious files and its metadata manipulated by adversaries.
DE.CM-01.02 Network traffic volume monitoring Mitigates T1498.002 Reflection Amplification
Comments
This diagnostic statement may block Denial of Service (DoS) attacks from occurring by adversaries that induces a reflection attack by sending packets to reflectors with the spoofed address of the victim. Filtering boundary traffic can be used to intercept incoming traffic and filtering out the attack traffic from the original traffic.
DE.CM-01.02 Network traffic volume monitoring Mitigates T1498.001 Direct Network Flood
Comments
This diagnostic statement may block Denial of Service (DoS) attacks from occurring by adversaries that target networks that send a high volume of network traffic to a target. Filtering boundary traffic can be used to intercept incoming traffic and filtering out the attack traffic from the original traffic.
DE.CM-01.02 Network traffic volume monitoring Mitigates T1498 Network Denial of Service
Comments
This diagnostic statement may block Network Denial of Service (DoS) attacks from occurring by adversaries that target resources to users via websites, email services, DNS, and web-based applications. Filtering boundary traffic can be used to intercept incoming traffic and filtering out the attack traffic from the original traffic.
DE.CM-01.02 Network traffic volume monitoring Mitigates T1499.004 Application or System Exploitation
Comments
This diagnostic statement may block Denial of Service (DoS) attacks from occurring by adversaries that exploit software vulnerabilities that can cause crashing of a system or application. Filtering boundary traffic can be used to block source addresses and block ports that are being targeted. It also blocks protocols being used for transport.
DE.CM-01.02 Network traffic volume monitoring Mitigates T1499.003 Application Exhaustion Flood
Comments
This diagnostic statement may block Denial of Service (DoS) attacks from occurring by adversaries that target application features. Filtering boundary traffic can be used to block source addresses and block ports that are being targeted. It also blocks protocols being used for transport.
DE.CM-01.02 Network traffic volume monitoring Mitigates T1499.002 Service Exhaustion Flood
Comments
This diagnostic statement may block Endpoint Denial of Service (DoS) attacks from occurring from adversaries that target DNS and web services. Filtering boundary traffic can be used to block source addresses and block ports that are being targeted. It also blocks protocols being used for transport.
DE.CM-01.02 Network traffic volume monitoring Mitigates T1499.001 OS Exhaustion Flood
Comments
This diagnostic statement may block Endpoint Denial of Service (DoS) attacks from occurring by adversaries that target endpoint's operating system (OS). Filtering boundary traffic can be used to block source addresses and block ports that are being targeted. It also blocks protocols being used for transport.
DE.CM-01.02 Network traffic volume monitoring Mitigates T1499 Endpoint Denial of Service
Comments
This diagnostic statement may block Endpoint Denial of Service (DoS) attacks from occurring via websites, email services, and web-based applications. Filtering boundary traffic can be used to block source addresses and block ports that are being targeted. It also blocks protocols being used for transport.
DE.CM-01.05 Website and service blocking Mitigates T1102.003 One-Way Communication
Comments
This diagnostic statement helps mitigate web service techniques through the implementation of tools and measures to detect and block access to unauthorized, inappropriate, or malicious websites and services.
DE.CM-01.05 Website and service blocking Mitigates T1102.002 Bidirectional Communication
Comments
This diagnostic statement helps mitigate web service techniques through the implementation of tools and measures to detect and block access to unauthorized, inappropriate, or malicious websites and services.
DE.CM-01.05 Website and service blocking Mitigates T1102.001 Dead Drop Resolver
Comments
This diagnostic statement helps mitigate web service techniques through the implementation of tools and measures to detect and block access to unauthorized, inappropriate, or malicious websites and services.
DE.CM-01.05 Website and service blocking Mitigates T1102 Web Service
Comments
This diagnostic statement helps mitigate web service techniques through the implementation of tools and measures to detect and block access to unauthorized, inappropriate, or malicious websites and services.
DE.CM-01.05 Website and service blocking Mitigates T1204.002 Malicious File
Comments
This diagnostic statement protects user execution through the implementation of tools and measures to block unknown or unused files in transit.
DE.CM-01.05 Website and service blocking Mitigates T1204 User Execution
Comments
This diagnostic statement protects user execution through the implementation of tools and measures to block unknown or unused files in transit.
DE.CM-01.05 Website and service blocking Mitigates T1550 Use Alternate Authentication Material
Comments
This diagnostic statement provides for implementing tools and measures for such as allowing/denying types of third-party applications which can help prevent adversary use of alternate authentication material.
DE.CM-01.05 Website and service blocking Mitigates T1218.001 Compiled HTML File
Comments
This diagnostic statement can help prevent adversaries from abusing HTML files by implementing tools and measures to block download/transfer of uncommon file types known to be used in adversary campaigns.
DE.CM-01.05 Website and service blocking Mitigates T1218 System Binary Proxy Execution
Comments
This diagnostic statement can help prevent execution of malicious content with signed files or trusted binaries through tools and measures restricting or blocking certain websites, blocking downloads/attachments, and restricting browser extensions.
DE.CM-01.05 Website and service blocking Mitigates T1539 Steal Web Session Cookie
Comments
This diagnostic statement provides for implementing tools and measures for web-based content and browser security settings that can help prevent session cookie theft.
DE.CM-01.05 Website and service blocking Mitigates T1528 Steal Application Access Token
Comments
This diagnostic statement provides for implementing tools and measures such as disabling users from authorizing third-party apps and forcing administrative consent for all requests that can help prevent token theft.
DE.CM-01.05 Website and service blocking Mitigates T1566.003 Spearphishing via Service
Comments
This diagnostic statement provides for implementing tools and measures such as filtering messages and restricting certain websites or attachment types, which can help block phishing attempts.
DE.CM-01.05 Website and service blocking Mitigates T1566.002 Spearphishing Link
Comments
This diagnostic statement provides for implementing tools and measures such as filtering messages and restricting certain websites or attachment types, which can help block phishing attempts.
DE.CM-01.05 Website and service blocking Mitigates T1566.001 Spearphishing Attachment
Comments
This diagnostic statement provides for implementing tools and measures such as filtering messages and restricting certain websites or attachment types, which can help block phishing attempts.
DE.CM-01.05 Website and service blocking Mitigates T1566 Phishing
Comments
This diagnostic statement provides for implementing tools and measures such as filtering messages and restricting certain websites or attachment types, which can help block phishing attempts.
DE.CM-01.05 Website and service blocking Mitigates T1189 Drive-by Compromise
Comments
This diagnostic statement helps mitigate drive-by compromise through the implementation of tools and measures such as adblockers to prevent and block malicious code execution and script blocking extensions to block execution of scripts.
DE.CM-01.05 Website and service blocking Mitigates T1555.003 Credentials from Web Browsers
Comments
This diagnostic statement provides for implementing tools and measures for web-based content and browser security settings that can help prevent session cookie theft.
DE.CM-01.05 Website and service blocking Mitigates T1659 Content Injection
Comments
This diagnostic statement provides for implementing tools and measures such as blocking download/transfer and execution of uncommon file types which can help prevent content injection.
DE.CM-01.05 Website and service blocking Mitigates T1059.007 JavaScript
Comments
This diagnostic statement prevents adversaries from abusing various implementation of JavaScript for execution by blocking the execution of scripts and malicious code that pop up via adblockers and ads.
DE.CM-01.05 Website and service blocking Mitigates T1059 Command and Scripting Interpreter
Comments
This diagnostic statement prevents adversaries from abusing commands, scripts, or binaries by blocking the execution of scripts and malicious code that pop up via adblockers and ads.
DE.CM-03.03 Privileged account monitoring Mitigates T1047 Windows Management Instrumentation
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1078.004 Cloud Accounts
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1078.003 Local Accounts
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1078.002 Domain Accounts
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1078.001 Default Accounts
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1072 Software Deployment Tools
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1053.007 Container Orchestration Job
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1053.006 Systemd Timers
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1053.005 Scheduled Task
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1053.002 At
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1053 Scheduled Task/Job
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1556.007 Hybrid Identity
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1556.005 Reversible Encryption
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1556.004 Network Device Authentication
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1556.006 Multi-Factor Authentication
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1556.001 Domain Controller Authentication
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1556 Modify Authentication Process
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1606.002 SAML Tokens
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1606 Forge Web Credentials
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1210 Exploitation of Remote Services
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1190 Exploit Public-Facing Application
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1543.005 Container Service
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1543 Create or Modify System Process
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1651 Cloud Administration Command
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1098.003 Additional Cloud Roles
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1098.002 Additional Email Delegate Permissions
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1098.001 Additional Cloud Credentials
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1098 Account Manipulation
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1548.006 TCC Manipulation
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1548.003 Sudo and Sudo Caching
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1548.002 Bypass User Account Control
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-03.03 Privileged account monitoring Mitigates T1548 Abuse Elevation Control Mechanism
Comments
This diagnostic statement implements mechanisms and tools to mitigate potential misuse of privileged users and accounts. Continuous monitoring of role and attribute assignments and activity is essential to prevent and detect unauthorized access or misuse.
DE.CM-01.05 Website and service blocking Mitigates T1059.005 Visual Basic
Comments
This diagnostic statement prevents adversaries from abusing commands, scripts, or binaries by blocking the execution of scripts and malicious code that pop up via adblockers and ads.

Capabilities

Capability ID Capability Name Number of Mappings
DE.CM-09.02 Hardware integrity checking 8
DE.CM-01.03 Unauthorized network connections and data transfers 14
DE.CM-01.04 Unauthorized device connection 3
DE.CM-01.02 Network traffic volume monitoring 8
DE.CM-01.05 Website and service blocking 22
DE.CM-09.01 Software and data integrity checking 46
DE.CM-09.03 Unauthorized software, hardware, or configuration changes 7
DE.CM-01.01 Intrusion detection and prevention 41
DE.CM-06.02 Third-party access monitoring 73
DE.CM-03.03 Privileged account monitoring 41