CRI Profile Protect: Data Security Capability Group

All Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
PR.DS-02.01 Data-in-transit protection Mitigates T1040 Network Sniffing
Comments
This diagnostic statement protects adversaries from being able to access data in transit over networks. Encrypting information and files by utilizing authentication protocols, such as Kerberos, can ensure web traffic that may contain credentials is protected by SSL/TLS.
PR.DS-02.01 Data-in-transit protection Mitigates T1565.002 Transmitted Data Manipulation
Comments
This diagnostic statement provides another layer of protection from adversaries trying to gain access to data that is en route to storage or other systems.
PR.DS-02.01 Data-in-transit protection Mitigates T1550.003 Pass the Ticket
Comments
This diagnostic statement provide protection from adversaries that may possibly use stolen Kerberos tickets. Various methods should be used to protect data-in-transit including encryption, password hashing, and tokenization.
PR.DS-02.01 Data-in-transit protection Mitigates T1550.002 Pass the Hash
Comments
This diagnostic statement provide protection from adversaries that may possibly utilize stolen password hashes. Various methods should be used to protect data-in-transit including encryption, password hashing, and tokenization.
PR.DS-02.01 Data-in-transit protection Mitigates T1550.001 Application Access Token
Comments
This diagnostic statement provide protection from adversaries that may possibly bypass the authentication process and use stolen tokens. Various methods should be used to protect data-in-transit including encryption, password hashing, and tokenization.
PR.DS-02.01 Data-in-transit protection Mitigates T1550 Use Alternate Authentication Material
Comments
This diagnostic statement provide protection from adversaries that may possibly attack via alternate authentication methods. Various methods should be used to protect data-in-transit including encryption, password hashing, and tokenization.
PR.DS-01.01 Data-at-rest protection Mitigates T1048.003 Exfiltration Over Unencrypted Non-C2 Protocol
Comments
This diagnostic statement focuses on protecting data-at-rest by implementing encryption and other security measures such as sandboxing, authentication, segregation, masking, tokenization, and file integrity monitoring.
PR.DS-01.01 Data-at-rest protection Mitigates T1041 Exfiltration Over C2 Channel
Comments
This diagnostic statement focuses on protecting data-at-rest by implementing encryption and other security measures such as sandboxing, authentication, segregation, masking, tokenization, and file integrity monitoring.
PR.DS-01.01 Data-at-rest protection Mitigates T1005 Data from Local System
Comments
This diagnostic statement focuses on protecting data-at-rest by implementing encryption and other security measures such as sandboxing, authentication, segregation, masking, tokenization, and file integrity monitoring.
PR.DS-01.01 Data-at-rest protection Mitigates T1550.001 Application Access Token
Comments
This diagnostic statement focuses on protecting data-at-rest by implementing encryption and other security measures such as sandboxing, authentication, segregation, masking, tokenization, and file integrity monitoring.
PR.DS-01.01 Data-at-rest protection Mitigates T1003.003 NTDS
Comments
This diagnostic statement focuses on protecting data-at-rest by implementing encryption and other security measures such as sandboxing, authentication, segregation, masking, tokenization, and file integrity monitoring.
PR.DS-01.01 Data-at-rest protection Mitigates T1040 Network Sniffing
Comments
This diagnostic statement focuses on protecting data-at-rest by implementing encryption and other security measures such as sandboxing, authentication, segregation, masking, tokenization, and file integrity monitoring.
PR.DS-01.01 Data-at-rest protection Mitigates T1565.002 Transmitted Data Manipulation
Comments
This diagnostic statement focuses on protecting data-at-rest by implementing encryption and other security measures such as sandboxing, authentication, segregation, masking, tokenization, and file integrity monitoring.
PR.DS-01.01 Data-at-rest protection Mitigates T1565.001 Stored Data Manipulation
Comments
This diagnostic statement focuses on protecting data-at-rest by implementing encryption and other security measures such as sandboxing, authentication, segregation, masking, tokenization, and file integrity monitoring.
PR.DS-01.01 Data-at-rest protection Mitigates T1530 Data from Cloud Storage
Comments
This diagnostic statement focuses on protecting data-at-rest by implementing encryption and other security measures such as sandboxing, authentication, segregation, masking, tokenization, and file integrity monitoring.
PR.DS-01.01 Data-at-rest protection Mitigates T1213 Data from Information Repositories
Comments
This diagnostic statement focuses on protecting data-at-rest by implementing encryption and other security measures such as sandboxing, authentication, segregation, masking, tokenization, and file integrity monitoring.
PR.DS-01.01 Data-at-rest protection Mitigates T1557.002 ARP Cache Poisoning
Comments
This diagnostic statement focuses on protecting data-at-rest by implementing encryption and other security measures such as sandboxing, authentication, segregation, masking, tokenization, and file integrity monitoring.
PR.DS-01.01 Data-at-rest protection Mitigates T1557 Adversary-in-the-Middle
Comments
This diagnostic statement focuses on protecting data-at-rest by implementing encryption and other security measures such as sandboxing, authentication, segregation, masking, tokenization, and file integrity monitoring.
PR.DS-01.03 Removable media protection Mitigates T1030 Data Transfer Size Limits
Comments
This diagnostic statement focuses on restricting the use of removable media devices (e.g., USB drives, CDs, DVDs) to prevent unauthorized access, data leakage, or malicious activity.
PR.DS-01.03 Removable media protection Mitigates T1200 Hardware Additions
Comments
This diagnostic statement focuses on restricting the use of removable media devices (e.g., USB drives, CDs, DVDs) to prevent unauthorized access, data leakage, or malicious activity.
PR.DS-01.03 Removable media protection Mitigates T1092 Communication Through Removable Media
Comments
This diagnostic statement focuses on restricting the use of removable media devices (e.g., USB drives, CDs, DVDs) to prevent unauthorized access, data leakage, or malicious activity.
PR.DS-01.03 Removable media protection Mitigates T1025 Data from Removable Media
Comments
This diagnostic statement focuses on restricting the use of removable media devices (e.g., USB drives, CDs, DVDs) to prevent unauthorized access, data leakage, or malicious activity.
PR.DS-01.02 Data loss prevention Mitigates T1537 Transfer Data to Cloud Account
Comments
The use of data loss prevention controls may mitigate the techniques related to data leakage and loss from local systems, automated exfiltration, and exfiltration over non-approved services.
PR.DS-01.02 Data loss prevention Mitigates T1567.004 Exfiltration Over Webhook
Comments
The use of data loss prevention controls may mitigate the techniques related to data leakage and loss from local systems, automated exfiltration, and exfiltration over non-approved services.
PR.DS-01.02 Data loss prevention Mitigates T1052.001 Exfiltration over USB
Comments
The use of data loss prevention controls may mitigate the techniques related to data leakage and loss from local systems, automated exfiltration, and exfiltration over non-approved services.
PR.DS-01.02 Data loss prevention Mitigates T1052 Exfiltration Over Physical Medium
Comments
The use of data loss prevention controls may mitigate the techniques related to data leakage and loss from local systems, automated exfiltration, and exfiltration over non-approved services.
PR.DS-01.02 Data loss prevention Mitigates T1041 Exfiltration Over C2 Channel
Comments
The use of data loss prevention controls may mitigate the techniques related to data leakage and loss from local systems, automated exfiltration, and exfiltration over non-approved services.
PR.DS-01.02 Data loss prevention Mitigates T1048.003 Exfiltration Over Unencrypted Non-C2 Protocol
Comments
The use of data loss prevention controls may mitigate the techniques related to data leakage and loss from local systems, automated exfiltration, and exfiltration over non-approved services.
PR.DS-01.02 Data loss prevention Mitigates T1048.002 Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
Comments
The use of data loss prevention controls may mitigate the techniques related to data leakage and loss from local systems, automated exfiltration, and exfiltration over non-approved services.
PR.DS-01.02 Data loss prevention Mitigates T1048 Exfiltration Over Alternative Protocol
Comments
The use of data loss prevention controls may mitigate the techniques related to data leakage and loss from local systems, automated exfiltration, and exfiltration over non-approved services.
PR.DS-01.02 Data loss prevention Mitigates T1025 Data from Removable Media
Comments
The use of data loss prevention controls may mitigate the techniques related to data leakage and loss from local systems, automated exfiltration, and exfiltration over non-approved services.
PR.DS-01.02 Data loss prevention Mitigates T1005 Data from Local System
Comments
The use of data loss prevention controls may mitigate the techniques related to data leakage and loss from local systems, automated exfiltration, and exfiltration over non-approved services.
PR.DS-01.02 Data loss prevention Mitigates T1020.001 Traffic Duplication
Comments
The use of data loss prevention controls may mitigate the techniques related to data leakage and loss from local systems, automated exfiltration, and exfiltration over non-approved services.
PR.DS-11.01 Data backup and replication Mitigates T1565.001 Stored Data Manipulation
Comments
This diagnostic statement provides protection from adversaries that try to manipulate and/or modify data at rest, which harms the integrity of data. Implementing data backup or disaster recovery plan can be used to restore organizational data that adversaries may have attempted to overwrite. Ensure backups are stored off system and is protected from common methods adversaries may use to gain access and manipulate backups.
PR.DS-11.01 Data backup and replication Mitigates T1565 Data Manipulation
Comments
This diagnostic statement provides protection from adversaries that try to manipulate, modify and/or harm the integrity of data. Implementing data backup or disaster recovery plan can be used to restore organizational data that adversaries may have attempted to overwrite. Ensure backups are stored off system and is protected from common methods adversaries may use to gain access and manipulate backups.
PR.DS-11.01 Data backup and replication Mitigates T1561.002 Disk Structure Wipe
Comments
This diagnostic statement protects adversaries that can wipe/corrupt disk data structures on a hard drive. Implementing data backup or disaster recovery plan can be used to restore organizational data that adversaries may have attempted to overwrite while targeting critical systems
PR.DS-11.01 Data backup and replication Mitigates T1561.001 Disk Content Wipe
Comments
This diagnostic statement protects adversaries that can wipe/corrupt contents of storage device data. Implementing data backup or disaster recovery plan can be used to restore organizational data that adversaries may have attempted to overwrite.
PR.DS-11.01 Data backup and replication Mitigates T1561 Disk Wipe
Comments
This diagnostic statement protects adversaries that can wipe/corrupt raw disk data on systems. Implementing data backup or disaster recovery plan can be used to restore organizational data that adversaries may have attempted to overwrite.
PR.DS-11.01 Data backup and replication Mitigates T1490 Inhibit System Recovery
Comments
This diagnostic statement provides protection from adversaries that try to remove built in data and/or turn off services that are used to help with the recovery of corrupted systems. Ensuring backups are stored off system and is protected from common methods adversaries may use to gain access and destroy the backups to prevent recovery is a way to deny adversaries access to available backup and recovery options
PR.DS-11.01 Data backup and replication Mitigates T1486 Data Encrypted for Impact
Comments
This diagnostic statement provides protection from adversaries that may encrypt data on target systems in a network to interrupt availability to system and network resources. They can attempt to render stored data inaccessible by encrypting files or data on local and remote drives and withholding access to a decryption key. Implementing data backup or disaster recovery plan can be used to restore organizational data. Ensure backups are stored off system and is protected from common methods adversaries may use to gain access and destroy the backups to prevent recovery.
PR.DS-11.01 Data backup and replication Mitigates T1485.001 Lifecycle-Triggered Deletion
Comments
This diagnostic statement provides protection from adversaries that may modify lifecycle policies of cloud storage bucket to destroy all objects stored within. Implementing data backup or disaster recovery plan can be used to restore organizational data.
PR.DS-11.01 Data backup and replication Mitigates T1485 Data Destruction
Comments
This diagnostic statement provides protection from adversaries that may try to destroy data and files on systems or on a network/network resource. Implementing data backup or disaster recovery plan can be used to restore organizational data.
PR.DS-10.01 Data-in-use protection Mitigates T1537 Transfer Data to Cloud Account
Comments
This Diagnostic Statement describes mitigations related to protecting data-in-use, mentioning encryption, access control methods and authentication. Using encryption for data-in-use, alongside other safeguards such for restricting exfiltration of sensitive data aid with mitigating collection and exfiltration threats.
PR.DS-10.01 Data-in-use protection Mitigates T1567 Exfiltration Over Web Service
Comments
This Diagnostic Statement describes mitigations related to protecting data-in-use, mentioning encryption, access control methods and authentication. Using encryption for data-in-use, alongside other safeguards such for restricting exfiltration of sensitive data aid with mitigating collection and exfiltration threats.
PR.DS-10.01 Data-in-use protection Mitigates T1052 Exfiltration Over Physical Medium
Comments
This Diagnostic Statement describes mitigations related to protecting data-in-use, mentioning encryption, access control methods and authentication. Using encryption for data-in-use, alongside other safeguards such for restricting exfiltration of sensitive data aid with mitigating collection and exfiltration threats.
PR.DS-10.01 Data-in-use protection Mitigates T1052.001 Exfiltration over USB
Comments
This Diagnostic Statement describes mitigations related to protecting data-in-use, mentioning encryption, access control methods and authentication. Using encryption for data-in-use, alongside other safeguards such for restricting exfiltration of sensitive data aid with mitigating collection and exfiltration threats.
PR.DS-10.01 Data-in-use protection Mitigates T1025 Data from Removable Media
Comments
This Diagnostic Statement describes mitigations related to protecting data-in-use, mentioning encryption, access control methods and authentication. Using encryption for data-in-use, alongside other safeguards such for restricting exfiltration of sensitive data aid with mitigating collection and exfiltration threats.
PR.DS-10.01 Data-in-use protection Mitigates T1041 Exfiltration Over C2 Channel
Comments
This Diagnostic Statement describes mitigations related to protecting data-in-use, mentioning encryption, access control methods and authentication. Using encryption for data-in-use, alongside other safeguards such for restricting exfiltration of sensitive data aid with mitigating collection and exfiltration threats.
PR.DS-10.01 Data-in-use protection Mitigates T1048 Exfiltration Over Alternative Protocol
Comments
This Diagnostic Statement describes mitigations related to protecting data-in-use, mentioning encryption, access control methods and authentication. Using encryption for data-in-use, alongside other safeguards such for restricting exfiltration of sensitive data aid with mitigating collection and exfiltration threats.
PR.DS-10.01 Data-in-use protection Mitigates T1005 Data from Local System
Comments
This Diagnostic Statement describes mitigations related to protecting data-in-use, mentioning encryption, access control methods and authentication. Using encryption for data-in-use, alongside other safeguards such for restricting exfiltration of sensitive data aid with mitigating collection and exfiltration threats.
PR.DS-10.01 Data-in-use protection Mitigates T1040 Network Sniffing
Comments
This Diagnostic Statement describes mitigations related to protecting data-in-use, mentioning encryption, access control methods and authentication. Using encryption for data-in-use, alongside other safeguards such for restricting exfiltration of sensitive data aid with mitigating collection and exfiltration threats.
PR.DS-10.01 Data-in-use protection Mitigates T1070 Indicator Removal
Comments
This Diagnostic Statement describes mitigations related to protecting data-in-use, mentioning encryption, access control methods and authentication. Using encryption for data-in-use, alongside other safeguards such for restricting exfiltration of sensitive data aid with mitigating collection and exfiltration threats.
PR.DS-10.01 Data-in-use protection Mitigates T1565.001 Stored Data Manipulation
Comments
This Diagnostic Statement describes mitigations related to protecting data-in-use, mentioning encryption, access control methods and authentication. Using encryption for data-in-use, alongside other safeguards such for restricting exfiltration of sensitive data aid with mitigating collection and exfiltration threats.
PR.DS-10.01 Data-in-use protection Mitigates T1565 Data Manipulation
Comments
This Diagnostic Statement describes mitigations related to protecting data-in-use, mentioning encryption, access control methods and authentication. Using encryption for data-in-use, alongside other safeguards such for restricting exfiltration of sensitive data aid with mitigating collection and exfiltration threats.
PR.DS-10.01 Data-in-use protection Mitigates T1213 Data from Information Repositories
Comments
This Diagnostic Statement describes mitigations related to protecting data-in-use, mentioning encryption, access control methods and authentication. Using encryption for data-in-use, alongside other safeguards such for restricting exfiltration of sensitive data aid with mitigating collection and exfiltration threats.
PR.DS-10.01 Data-in-use protection Mitigates T1602 Data from Configuration Repository
Comments
This Diagnostic Statement describes mitigations related to protecting data-in-use, mentioning encryption, access control methods and authentication. Using encryption for data-in-use, alongside other safeguards such for restricting exfiltration of sensitive data aid with mitigating collection and exfiltration threats.
PR.DS-10.01 Data-in-use protection Mitigates T1530 Data from Cloud Storage
Comments
This Diagnostic Statement describes mitigations related to protecting data-in-use, mentioning encryption, access control methods and authentication. Using encryption for data-in-use, alongside other safeguards such for restricting exfiltration of sensitive data aid with mitigating collection and exfiltration threats.
PR.DS-10.01 Data-in-use protection Mitigates T1020 Automated Exfiltration
Comments
This Diagnostic Statement describes mitigations related to protecting data-in-use, mentioning encryption, access control methods and authentication. Using encryption for data-in-use, alongside other safeguards such for restricting exfiltration of sensitive data aid with mitigating collection and exfiltration threats.
PR.DS-10.01 Data-in-use protection Mitigates T1119 Automated Collection
Comments
This Diagnostic Statement describes mitigations related to protecting data-in-use, mentioning encryption, access control methods and authentication. Using encryption for data-in-use, alongside other safeguards such for restricting exfiltration of sensitive data aid with mitigating collection and exfiltration threats.

Capabilities

Capability ID Capability Name Number of Mappings
PR.DS-11.01 Data backup and replication 9
PR.DS-02.01 Data-in-transit protection 6
PR.DS-01.02 Data loss prevention 11
PR.DS-01.03 Removable media protection 4
PR.DS-10.01 Data-in-use protection 17
PR.DS-01.01 Data-at-rest protection 12