CRI Profile Protect: Technology Infrastructure Resilience Capability Group

All Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
PR.IR-01.08 End-user device access Mitigates T1006 Direct Volume Access
Comments
This diagnostic statement implements technical controls (e.g., VPN, antivirus software) to address the risks of end-user personal computing devices accessing the organization’s network and resources.
PR.IR-01.08 End-user device access Mitigates T1221 Template Injection
Comments
This diagnostic statement implements technical controls (e.g., VPN, antivirus software) to address the risks of end-user personal computing devices accessing the organization’s network and resources.
PR.IR-01.08 End-user device access Mitigates T1027.002 Software Packing
Comments
This diagnostic statement implements technical controls (e.g., VPN, antivirus software) to address the risks of end-user personal computing devices accessing the organization’s network and resources.
PR.IR-01.08 End-user device access Mitigates T1080 Taint Shared Content
Comments
This diagnostic statement implements technical controls (e.g., VPN, antivirus software) to address the risks of end-user personal computing devices accessing the organization’s network and resources.
PR.IR-01.08 End-user device access Mitigates T1027.014 Polymorphic Code
Comments
This diagnostic statement implements technical controls (e.g., VPN, antivirus software) to address the risks of end-user personal computing devices accessing the organization’s network and resources.
PR.IR-01.08 End-user device access Mitigates T1027.013 Encrypted/Encoded File
Comments
This diagnostic statement implements technical controls (e.g., VPN, antivirus software) to address the risks of end-user personal computing devices accessing the organization’s network and resources.
PR.IR-01.08 End-user device access Mitigates T1027.012 LNK Icon Smuggling
Comments
This diagnostic statement implements technical controls (e.g., VPN, antivirus software) to address the risks of end-user personal computing devices accessing the organization’s network and resources.
PR.IR-01.08 End-user device access Mitigates T1027.010 Command Obfuscation
Comments
This diagnostic statement implements technical controls (e.g., VPN, antivirus software) to address the risks of end-user personal computing devices accessing the organization’s network and resources.
PR.IR-01.08 End-user device access Mitigates T1027.009 Embedded Payloads
Comments
This diagnostic statement implements technical controls (e.g., VPN, antivirus software) to address the risks of end-user personal computing devices accessing the organization’s network and resources.
PR.IR-01.08 End-user device access Mitigates T1027 Obfuscated Files or Information
Comments
This diagnostic statement implements technical controls (e.g., VPN, antivirus software) to address the risks of end-user personal computing devices accessing the organization’s network and resources.
PR.IR-01.08 End-user device access Mitigates T1036.008 Masquerade File Type
Comments
This diagnostic statement implements technical controls (e.g., VPN, antivirus software) to address the risks of end-user personal computing devices accessing the organization’s network and resources.
PR.IR-01.08 End-user device access Mitigates T1036 Masquerading
Comments
This diagnostic statement implements technical controls (e.g., VPN, antivirus software) to address the risks of end-user personal computing devices accessing the organization’s network and resources.
PR.IR-01.08 End-user device access Mitigates T1564 Hide Artifacts
Comments
This diagnostic statement implements technical controls (e.g., VPN, antivirus software) to address the risks of end-user personal computing devices accessing the organization’s network and resources.
PR.IR-01.08 End-user device access Mitigates T1564.012 File/Path Exclusions
Comments
This diagnostic statement implements technical controls (e.g., VPN, antivirus software) to address the risks of end-user personal computing devices accessing the organization’s network and resources.
PR.IR-01.08 End-user device access Mitigates T1059 Command and Scripting Interpreter
Comments
This diagnostic statement implements technical controls (e.g., VPN, antivirus software) to address the risks of end-user personal computing devices accessing the organization’s network and resources.
PR.IR-01.08 End-user device access Mitigates T1059.001 PowerShell
Comments
This diagnostic statement implements technical controls (e.g., VPN, antivirus software) to address the risks of end-user personal computing devices accessing the organization’s network and resources.
PR.IR-01.08 End-user device access Mitigates T1059.005 Visual Basic
Comments
This diagnostic statement implements technical controls (e.g., VPN, antivirus software) to address the risks of end-user personal computing devices accessing the organization’s network and resources.
PR.IR-01.08 End-user device access Mitigates T1059.006 Python
Comments
This diagnostic statement implements technical controls (e.g., VPN, antivirus software) to address the risks of end-user personal computing devices accessing the organization’s network and resources.
PR.IR-01.05 Remote access protection Mitigates T1078.001 Default Accounts
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1078.002 Domain Accounts
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1199 Trusted Relationship
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1021.007 Cloud Services
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1021.008 Direct Cloud VM Connections
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1021.002 SMB/Windows Admin Shares
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1021.004 SSH
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1021.006 Windows Remote Management
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1021.005 VNC
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1021.003 Distributed Component Object Model
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1021.001 Remote Desktop Protocol
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1021 Remote Services
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1021 Remote Services
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1021 Remote Services
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1556.006 Multi-Factor Authentication
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1133 External Remote Services
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1136.001 Local Account
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1136.002 Domain Account
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1136.003 Cloud Account
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1136 Create Account
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1098.006 Additional Container Cluster Roles
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1098.001 Additional Cloud Credentials
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1098.002 Additional Email Delegate Permissions
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1098.003 Additional Cloud Roles
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1098 Account Manipulation
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1078 Valid Accounts
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1078.004 Cloud Accounts
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1110.001 Password Guessing
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1110.003 Password Spraying
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1110.004 Credential Stuffing
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1651 Cloud Administration Command
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1648 Serverless Execution
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1110 Brute Force
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1606.002 SAML Tokens
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1606 Forge Web Credentials
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1601.002 Downgrade System Image
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1601.001 Patch System Image
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1601 Modify System Image
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1569.002 Service Execution
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1569 System Services
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1563.001 SSH Hijacking
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1558.003 Kerberoasting
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1558.002 Silver Ticket
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1558.001 Golden Ticket
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1558 Steal or Forge Kerberos Tickets
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1556.007 Hybrid Identity
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1556.005 Reversible Encryption
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1556.003 Pluggable Authentication Modules
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1556.004 Network Device Authentication
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1543.002 Systemd Service
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1543 Create or Modify System Process
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1547.006 Kernel Modules and Extensions
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1548.002 Bypass User Account Control
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1548.003 Sudo and Sudo Caching
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1548.006 TCC Manipulation
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1548 Abuse Elevation Control Mechanism
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1484.002 Trust Modification
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1484.001 Group Policy Modification
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1484 Domain or Tenant Policy Modification
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1550 Use Alternate Authentication Material
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1542.001 System Firmware
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1542.003 Bootkit
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.04 Wireless network protection Mitigates T1098 Account Manipulation
Comments
This diagnostic statement provides protections for wireless networks. Implementation of wireless network management measures such as network segmentation and access controls reduces the attack surface, restricts movement by adversaries, and protects data from compromise.
PR.IR-01.04 Wireless network protection Mitigates T1021.006 Windows Remote Management
Comments
This diagnostic statement provides protections for wireless networks. Implementation of wireless network management measures such as network segmentation and access controls reduces the attack surface, restricts movement by adversaries, and protects data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1599.001 Network Address Translation Traversal
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1599 Network Boundary Bridging
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1555.006 Cloud Secrets Management Stores
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1552.002 Credentials in Registry
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1548.003 Sudo and Sudo Caching
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1548.002 Bypass User Account Control
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1546.003 Windows Management Instrumentation Event Subscription
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1542.005 TFTP Boot
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1505.001 SQL Stored Procedures
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1505.002 Transport Agent
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1200 Hardware Additions
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1134.002 Create Process with Token
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1134.001 Token Impersonation/Theft
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1134.003 Make and Impersonate Token
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1133 External Remote Services
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1136.001 Local Account
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1136.002 Domain Account
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1136.003 Cloud Account
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1021.001 Remote Desktop Protocol
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.02 Network device configurations Mitigates T1610 Deploy Container
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, and protocols) aligned to security baselines. Using network appliances to limit communications with container services can prevent adversary deployment of a container.
PR.IR-01.02 Network device configurations Mitigates T1557.001 LLMNR/NBT-NS Poisoning and SMB Relay
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, and protocols) aligned to security baselines. Using network appliances to block or filter network traffic that is not necessary within the environment can prevent leveraging for AiTM conditions.
PR.IR-01.02 Network device configurations Mitigates T1557.003 DHCP Spoofing
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, and protocols) aligned to security baselines. Using network appliances to block or filter network traffic that is not necessary within the environment can prevent leveraging for AiTM conditions.
PR.IR-01.02 Network device configurations Mitigates T1218 System Binary Proxy Execution
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, and protocols) aligned to security baselines. Using network appliances to block or filter network traffic can help to mitigate this technique.
PR.IR-01.02 Network device configurations Mitigates T1071.004 DNS
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, protocols) aligned to security baselines. Using network appliances to block or filter network traffic that is not necessary within the environment can mitigate adversary use of application layer protocols.
PR.IR-03.01 Alternative resilience mechanisms Mitigates T1485 Data Destruction
Comments
This diagnostic statement protects against Data Destruction through the use of failsafes, backup facilities, disaster recovery, and resilience strategies including resumption of critical services.
PR.IR-03.01 Alternative resilience mechanisms Mitigates T1485.001 Lifecycle-Triggered Deletion
Comments
This diagnostic statement protects against Lifecycle-Triggered Deletion through the use of failsafes, backup facilities, disaster recovery, and resilience strategies including resumption of critical services.
PR.IR-03.01 Alternative resilience mechanisms Mitigates T1486 Data Encrypted for Impact
Comments
This diagnostic statement protects against Data Encrypted for Impact through the use of failsafes, backup facilities, disaster recovery, and resilience strategies including resumption of critical services.
PR.IR-03.01 Alternative resilience mechanisms Mitigates T1491 Defacement
Comments
This diagnostic statement protects against Defacement through the use of failsafes, backup facilities, disaster recovery, and resilience strategies including resumption of critical services.
PR.IR-03.01 Alternative resilience mechanisms Mitigates T1491.001 Internal Defacement
Comments
This diagnostic statement protects against Internal Defacement through the use of failsafes, backup facilities, disaster recovery, and resilience strategies including resumption of critical services.
PR.IR-03.01 Alternative resilience mechanisms Mitigates T1491.002 External Defacement
Comments
This diagnostic statement protects against External Defacement through the use of failsafes, backup facilities, disaster recovery, and resilience strategies including resumption of critical services.
PR.IR-03.01 Alternative resilience mechanisms Mitigates T1561 Disk Wipe
Comments
This diagnostic statement protects against Disk Wipe through the use of failsafes, backup facilities, disaster recovery, and resilience strategies including resumption of critical services.
PR.IR-03.01 Alternative resilience mechanisms Mitigates T1561.001 Disk Content Wipe
Comments
This diagnostic statement protects against Disk Content Wipe through the use of failsafes, backup facilities, disaster recovery, and resilience strategies including resumption of critical services.
PR.IR-03.01 Alternative resilience mechanisms Mitigates T1561.002 Disk Structure Wipe
Comments
This diagnostic statement protects against Disk Structure Wipe through the use of failsafes, backup facilities, disaster recovery, and resilience strategies including resumption of critical services.
PR.IR-03.01 Alternative resilience mechanisms Mitigates T1490 Inhibit System Recovery
Comments
This diagnostic statement protects against Inhibit System Recovery through the use of failsafes, backup facilities, disaster recovery, and resilience strategies including resumption of critical services.
PR.IR-03.01 Alternative resilience mechanisms Mitigates T1020 Automated Exfiltration
Comments
This diagnostic statement protects against Automated Exfiltration through the use of failsafes, backup facilities, disaster recovery, and resilience strategies including resumption of critical services.
PR.IR-03.01 Alternative resilience mechanisms Mitigates T1020.001 Traffic Duplication
Comments
This diagnostic statement protects against Traffic Duplication through the use of failsafes, backup facilities, disaster recovery, and resilience strategies including resumption of critical services.
PR.IR-03.01 Alternative resilience mechanisms Mitigates T1005 Data from Local System
Comments
This diagnostic statement protects against Data from Local System through the use of failsafes, backup facilities, disaster recovery, and resilience strategies including resumption of critical services.
PR.IR-03.01 Alternative resilience mechanisms Mitigates T1025 Data from Removable Media
Comments
This diagnostic statement protects against Data from Removable Media through the use of failsafes, backup facilities, disaster recovery, and resilience strategies including resumption of critical services.
PR.IR-03.01 Alternative resilience mechanisms Mitigates T1048 Exfiltration Over Alternative Protocol
Comments
This diagnostic statement protects against Exfiltration Over Alternative Protocol through the use of failsafes, backup facilities, disaster recovery, and resilience strategies including resumption of critical services.
PR.IR-03.01 Alternative resilience mechanisms Mitigates T1048.002 Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
Comments
This diagnostic statement protects against Exfiltration Over Asymmetric Encrypted Non-C2 Protocol through the use of failsafes, backup facilities, disaster recovery, and resilience strategies including resumption of critical services.
PR.IR-03.01 Alternative resilience mechanisms Mitigates T1048.003 Exfiltration Over Unencrypted Non-C2 Protocol
Comments
This diagnostic statement protects against Exfiltration Over Unencrypted Non-C2 Protocol through the use of failsafes, backup facilities, disaster recovery, and resilience strategies including resumption of critical services.
PR.IR-03.01 Alternative resilience mechanisms Mitigates T1041 Exfiltration Over C2 Channel
Comments
This diagnostic statement protects against Exfiltration Over C2 Channel through the use of failsafes, backup facilities, disaster recovery, and resilience strategies including resumption of critical services.
PR.IR-03.01 Alternative resilience mechanisms Mitigates T1052 Exfiltration Over Physical Medium
Comments
This diagnostic statement protects against Exfiltration Over Physical Medium through the use of failsafes, backup facilities, disaster recovery, and resilience strategies including resumption of critical services.
PR.IR-03.01 Alternative resilience mechanisms Mitigates T1052.001 Exfiltration over USB
Comments
This diagnostic statement protects against Exfiltration over USB through the use of failsafes, backup facilities, disaster recovery, and resilience strategies including resumption of critical services.
PR.IR-03.01 Alternative resilience mechanisms Mitigates T1567 Exfiltration Over Web Service
Comments
This diagnostic statement protects against Exfiltration Over Web Service through the use of failsafes, backup facilities, disaster recovery, and resilience strategies including resumption of critical services.
PR.IR-03.01 Alternative resilience mechanisms Mitigates T1567.004 Exfiltration Over Webhook
Comments
This diagnostic statement protects against Exfiltration Over Webhook through the use of failsafes, backup facilities, disaster recovery, and resilience strategies including resumption of critical services.
PR.IR-03.01 Alternative resilience mechanisms Mitigates T1537 Transfer Data to Cloud Account
Comments
This diagnostic statement protects against Transfer Data to Cloud Account through the use of failsafes, backup facilities, disaster recovery, and resilience strategies including resumption of critical services.
PR.IR-01.01 Network segmentation Mitigates T1552 Unsecured Credentials
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Employing network filtering, defense-in-depth, and access isolation principles provides protection against adversaries trying to obtain unsecured credentials.
PR.IR-01.01 Network segmentation Mitigates T1552.007 Container API
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Employing secure network configuration, defense-in-depth, and access isolation principles provides protection against adversaries attempting to obtain credentials via APIs within a containers environment.
PR.IR-01.01 Network segmentation Mitigates T1199 Trusted Relationship
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Employing network segmentation to isolate infrastructure and limit access through trusted third party relationships.
PR.IR-01.01 Network segmentation Mitigates T1072 Software Deployment Tools
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. The permissions required for execution of this technique vary by system configuration. Employing proper system isolation can protect critical network systems from potential exploitation.
PR.IR-01.01 Network segmentation Mitigates T1489 Service Stop
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Employing defense-in-depth and access isolation provides protection against adversaries attempting to stop services.
PR.IR-01.01 Network segmentation Mitigates T1021.001 Remote Desktop Protocol
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Employing measures such as blocking RDP traffic between network security zones provides protection against adversaries attempting to use RDP to expand access.
PR.IR-01.01 Network segmentation Mitigates T1021.003 Distributed Component Object Model
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Employing measures such as Windows Firewall provides protection against adversaries attempting to exploit Distributed Component Object Model.
PR.IR-01.01 Network segmentation Mitigates T1021.006 Windows Remote Management
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Employing measures such as blocking or restricting WinRM provides protection against adversaries attempting to exploit this service.
PR.IR-01.01 Network segmentation Mitigates T1563 Remote Service Session Hijacking
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Blocking network traffic that is not necessary can mitigate, or at least alleviate, use of remote services to move laterally in an environment.
PR.IR-01.01 Network segmentation Mitigates T1563.002 RDP Hijacking
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Blocking network traffic that is not necessary can mitigate, or at least alleviate, use of remote desktop to move laterally in an environment.
PR.IR-01.01 Network segmentation Mitigates T1571 Non-Standard Port
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Configuring firewalls and proxies to limit outgoing traffic to only necessary ports and proper systems can mitigate use of this technique.
PR.IR-01.01 Network segmentation Mitigates T1095 Non-Application Layer Protocol
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Configuring firewalls and proxies to limit outgoing traffic to only necessary ports and proper systems can mitigate use of this technique.
PR.IR-01.01 Network segmentation Mitigates T1040 Network Sniffing
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Employing measures such as denying direct access of broadcasts and multicast sniffing can prevent network sniffing attacks.
PR.IR-01.01 Network segmentation Mitigates T1046 Network Service Discovery
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Employing proper network segmentation can protect critical servers and devices from discovery and potential exploitation.
PR.IR-01.01 Network segmentation Mitigates T1133 External Remote Services
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Denying direct remote access to internal systems to prevent adversaries from leveraging external-facing remote services to access and/or persist within a network.
PR.IR-01.01 Network segmentation Mitigates T1210 Exploitation of Remote Services
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Segmenting externally facing networks and systems appropriately to mitigate exploitation of remote services.
PR.IR-01.01 Network segmentation Mitigates T1190 Exploit Public-Facing Application
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Segment externally facing servers and services to mitigate exploitation of public-facing applications.
PR.IR-01.01 Network segmentation Mitigates T1048 Exfiltration Over Alternative Protocol
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Network firewall configurations that allow only necessary ports and traffic can mitigate exfiltration of data over alternate protocols.
PR.IR-01.01 Network segmentation Mitigates T1048.001 Exfiltration Over Symmetric Encrypted Non-C2 Protocol
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Network firewall configurations that allow only necessary ports and traffic can mitigate exfiltration of data over alternate protocols.
PR.IR-01.01 Network segmentation Mitigates T1048.002 Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Network firewall configurations that allow only necessary ports and traffic can mitigate exfiltration of data over alternate protocols.
PR.IR-01.01 Network segmentation Mitigates T1048.003 Exfiltration Over Unencrypted Non-C2 Protocol
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Network firewall configurations that allow only necessary ports and traffic can mitigate exfiltration of data over alternate protocols.
PR.IR-01.01 Network segmentation Mitigates T1482 Domain Trust Discovery
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Employing network segmentation for sensitive domains can help prevent adversary exploitation of domain trust relationships.
PR.IR-01.01 Network segmentation Mitigates T1610 Deploy Container
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Employing network segmentation to deny direct remote access to internal systems externally provides protection against adversaries attempting to deploy containers.
PR.IR-01.01 Network segmentation Mitigates T1565 Data Manipulation
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Employ network segmentation to isolate and secure systems hosting critical business and system processes.
PR.IR-01.01 Network segmentation Mitigates T1565.003 Runtime Data Manipulation
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Employ network segmentation to isolate and secure systems hosting critical business and system processes.
PR.IR-01.01 Network segmentation Mitigates T1602 Data from Configuration Repository
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Employ network segmentation to segregate traffic to provide protection against adversaries attempting to obtain data from configuration repositories.
PR.IR-01.01 Network segmentation Mitigates T1602.001 SNMP (MIB Dump)
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Employ network segmentation to segregate traffic to provide protection against adversaries attempting to obtain data from configuration repositories.
PR.IR-01.01 Network segmentation Mitigates T1602.002 Network Device Configuration Dump
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Employ network segmentation to segregate traffic to provide protection against adversaries attempting to obtain data from configuration repositories.
PR.IR-01.01 Network segmentation Mitigates T1136 Create Account
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Limit access to critical systems and domain controllers to provide protection against adversaries attempting to create accounts.
PR.IR-01.01 Network segmentation Mitigates T1136.002 Domain Account
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Limit access to critical systems and domain controllers to provide protection against adversaries attempting to create accounts.
PR.IR-01.01 Network segmentation Mitigates T1136.003 Cloud Account
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Limit access to critical systems and domain controllers to provide protection against adversaries attempting to create accounts.
PR.IR-01.01 Network segmentation Mitigates T1613 Container and Resource Discovery
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Employing network segmentation to deny direct remote access to internal systems externally provides protection against adversaries attempting to discover resources in container environments.
PR.IR-01.01 Network segmentation Mitigates T1612 Build Image on Host
Comments
This diagnostic statement protects against Build Image on Host through the use of network segmentation, firewalls, secure network configuration, defense-in-depth and access isolation principles. Employing defense-in-depth and access isolation principles provides protection against adversaries attempting to build image on host.
PR.IR-01.01 Network segmentation Mitigates T1557 Adversary-in-the-Middle
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Isolate infrastructure components and blocking network traffic that is not necessary can mitigate, or at least alleviate, the scope of AiTM activity.
PR.IR-01.01 Network segmentation Mitigates T1557.001 LLMNR/NBT-NS Poisoning and SMB Relay
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Isolate infrastructure components and blocking network traffic that is not necessary can mitigate, or at least alleviate, the scope of AiTM activity.
PR.IR-01.01 Network segmentation Mitigates T1098 Account Manipulation
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Employing proper network segmentation limits access to critical systems and domain controllers.
PR.IR-01.01 Network segmentation Mitigates T1098.001 Additional Cloud Credentials
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Employing proper network segmentation limits access to critical systems and domain controllers.
PR.IR-01.01 Network segmentation Mitigates T1552.005 Cloud Instance Metadata API
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Employing network filtering, defense-in-depth, and access isolation principles provides protection against adversaries attempting to obtain credentials and other sensitive data.
PR.IR-01.01 Network segmentation Mitigates T1557.002 ARP Cache Poisoning
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Isolate infrastructure components and blocking network traffic that is not necessary can mitigate, or at least alleviate, the scope of AiTM activity.
PR.IR-01.01 Network segmentation Mitigates T1557.003 DHCP Spoofing
Comments
This diagnostic statement is for the implementation of network segmentation which helps prevent access to critical systems and sensitive information. Isolate infrastructure components and blocking network traffic that is not necessary can mitigate, or at least alleviate, the scope of AiTM activity.
PR.IR-04.01 Utilization monitoring Mitigates T1102 Web Service
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1104 Multi-Stage Channels
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1008 Fallback Channels
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1573 Encrypted Channel
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1030 Data Transfer Size Limits
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1071.001 Web Protocols
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1567 Exfiltration Over Web Service
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1572 Protocol Tunneling
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1599 Network Boundary Bridging
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1499 Endpoint Denial of Service
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1498 Network Denial of Service
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1020 Automated Exfiltration
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1567 Exfiltration Over Web Service
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1133 External Remote Services
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1046 Network Service Discovery
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1571 Non-Standard Port
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1552.007 Container API
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1552.005 Cloud Instance Metadata API
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1090.003 Multi-hop Proxy
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1090 Proxy
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1572 Protocol Tunneling
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1095 Non-Application Layer Protocol
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1021 Remote Services
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1021.005 VNC
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1021.002 SMB/Windows Admin Shares
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1071.005 Publish/Subscribe Protocols
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1071.004 DNS
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1071 Application Layer Protocol
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1602.002 Network Device Configuration Dump
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1602 Data from Configuration Repository
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1557.003 DHCP Spoofing
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1557.002 ARP Cache Poisoning
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1557.001 LLMNR/NBT-NS Poisoning and SMB Relay
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1557 Adversary-in-the-Middle
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1048.002 Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1041 Exfiltration Over C2 Channel
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1048.003 Exfiltration Over Unencrypted Non-C2 Protocol
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1048.002 Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.01 Utilization monitoring Mitigates T1048 Exfiltration Over Alternative Protocol
Comments
This diagnostic statement describes how the organization establishes and manages baseline measures of network activity. Supported by network monitoring tools and other controls to detect events and identify incidents. Mitigating mechanisms may include: Data Loss Prevention (DLP); Filtering Network Traffic; Limit Network Traffic; Network Intrusion Prevention Systems (NIPS); and Network Segmentation for these type of network-based techniques.
PR.IR-04.02 Availability and capacity management Mitigates T1498.001 Direct Network Flood
Comments
This diagnostic approach safeguards systems and network resources from adversaries seeking to block availability of services to user by attempting to conduct DoS attacks. Implementing mitigation strategies, such as filtering network traffic and using ISP or third-party providers, enables blocking IP addresses and protocols used for transport.
PR.IR-04.02 Availability and capacity management Mitigates T1498.002 Reflection Amplification
Comments
This diagnostic approach safeguards systems and network resources from adversaries seeking to block availability of services to user by attempting to conduct DoS attacks. Implementing mitigation strategies, such as filtering network traffic, enables blocking IP addresses and protocols used for transport.
PR.IR-04.02 Availability and capacity management Mitigates T1498 Network Denial of Service
Comments
This diagnostic approach safeguards systems and network resources from adversaries seeking to block availability of services to user by attempting to conduct DoS attacks. Implementing mitigation strategies, such as filtering network traffic, enables blocking IP addresses and protocols used for transport.
PR.IR-04.02 Availability and capacity management Mitigates T1499.004 Application or System Exploitation
Comments
This diagnostic approach safeguards systems and network resources from adversaries seeking to block availability of services to user by attempting to conduct DoS attacks. Implementing mitigation strategies, such as filtering network traffic, enables blocking IP addresses and protocols used for transport.
PR.IR-04.02 Availability and capacity management Mitigates T1499.003 Application Exhaustion Flood
Comments
This diagnostic approach safeguards systems and network resources from adversaries seeking to block availability of services to user by attempting to exploit software vulnerabilities that can cause an application or system to crash. Implementing mitigation strategies, such as filtering network traffic, enables blocking IP addresses and protocols used for transport.
PR.IR-04.02 Availability and capacity management Mitigates T1499.002 Service Exhaustion Flood
Comments
This diagnostic approach safeguards systems and network resources from adversaries seeking to block availability of services to user by attempting to conduct DoS attacks. Implementing mitigation strategies, such as filtering network traffic, enables blocking IP addresses and protocols used for transport.
PR.IR-04.02 Availability and capacity management Mitigates T1499 Endpoint Denial of Service
Comments
This diagnostic approach safeguards systems and network resources from adversaries seeking to block availability of services to user by attempting to conduct DoS attacks. Implementing mitigation strategies, such as filtering network traffic, enables blocking IP addresses and protocols used for transport.
PR.IR-04.02 Availability and capacity management Mitigates T1561.002 Disk Structure Wipe
Comments
This diagnostic approach safeguards systems and network resources from adversaries seeking to disrupt availability by attempting to corrupt or wipe the disk data structures on a hard drive. Implementing mitigation strategies, such as data backup, enables the restoration of organizational plans and critical information.
PR.IR-04.02 Availability and capacity management Mitigates T1561.001 Disk Content Wipe
Comments
This diagnostic approach safeguards systems and network resources from adversaries seeking to disrupt availability by attempting to erase contents of storage devices on systems and networks. Implementing mitigation strategies, such as data backup, enables the restoration of organizational plans and critical information.
PR.IR-04.02 Availability and capacity management Mitigates T1561 Disk Wipe
Comments
This diagnostic approach safeguards systems and network resources from adversaries seeking to disrupt availability by attempting to render stored data on local and remote drives via encryption. Implementing mitigation strategies, such as data backup, enables the restoration of organizational plans and critical information.
PR.IR-04.02 Availability and capacity management Mitigates T1486 Data Encrypted for Impact
Comments
This diagnostic approach safeguards systems and network resources from adversaries seeking to disrupt availability by attempting to wiping disk data on system and network resources. Implementing mitigation strategies, such as data backup, enables the restoration of organizational plans and critical information.
PR.IR-04.02 Availability and capacity management Mitigates T1485 Data Destruction
Comments
This diagnostic approach safeguards systems and network resources from adversaries seeking to disrupt availability by destroying data files. Implementing mitigation strategies, such as data backup, enables the restoration of organizational plans and critical information. Additionally, the use of multi-factor authentication serves as an effective measure to restrict unauthorized access to credentials, thereby reducing the risk of data destruction.
PR.IR-01.02 Network device configurations Mitigates T1021 Remote Services
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, protocols) aligned to security baselines. Using network appliances to block or filter network traffic that is not necessary within the environment can mitigate adversary use of remote services.
PR.IR-01.02 Network device configurations Mitigates T1021.001 Remote Desktop Protocol
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, protocols) aligned to security baselines. Using network appliances to block or filter network traffic that is not necessary within the environment can mitigate adversary use of remote services.
PR.IR-01.02 Network device configurations Mitigates T1021.003 Distributed Component Object Model
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, protocols) aligned to security baselines. Using network appliances to block or filter network traffic that is not necessary within the environment can mitigate adversary use of remote services.
PR.IR-01.02 Network device configurations Mitigates T1021.005 VNC
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, protocols) aligned to security baselines. Using network appliances to block or filter network traffic that is not necessary within the environment can mitigate adversary use of remote services.
PR.IR-01.02 Network device configurations Mitigates T1021.006 Windows Remote Management
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, protocols) aligned to security baselines. Using network appliances to block or filter network traffic that is not necessary within the environment can mitigate adversary use of remote services.
PR.IR-01.02 Network device configurations Mitigates T1048 Exfiltration Over Alternative Protocol
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, protocols) aligned to security baselines. Using network appliances to block or filter network traffic that is not necessary within the environment can mitigate adversary use of alternate protocols to exfiltrate data.
PR.IR-01.02 Network device configurations Mitigates T1048.001 Exfiltration Over Symmetric Encrypted Non-C2 Protocol
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, protocols) aligned to security baselines. Using network appliances to block or filter network traffic that is not necessary within the environment can mitigate adversary use of alternate protocols to exfiltrate data.
PR.IR-01.02 Network device configurations Mitigates T1048.002 Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, protocols) aligned to security baselines. Using network appliances to block or filter network traffic that is not necessary within the environment can mitigate adversary use of alternate protocols to exfiltrate data.
PR.IR-01.02 Network device configurations Mitigates T1048.003 Exfiltration Over Unencrypted Non-C2 Protocol
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, protocols) aligned to security baselines. Using network appliances to block or filter network traffic that is not necessary within the environment can mitigate adversary use of alternate protocols to exfiltrate data.
PR.IR-01.02 Network device configurations Mitigates T1071 Application Layer Protocol
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, protocols) aligned to security baselines. Using network appliances to block or filter network traffic that is not necessary within the environment can mitigate adversary use of application layer protocols.
PR.IR-01.02 Network device configurations Mitigates T1071.005 Publish/Subscribe Protocols
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, protocols) aligned to security baselines. Using network appliances to block or filter network traffic that is not necessary within the environment can mitigate adversary use of application layer protocols.
PR.IR-01.02 Network device configurations Mitigates T1095 Non-Application Layer Protocol
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, protocols) aligned to security baselines. Using network appliances to block or filter network traffic that is not necessary within the environment can mitigate adversary use of non-application layer protocols.
PR.IR-01.02 Network device configurations Mitigates T1133 External Remote Services
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, protocols) aligned to security baselines. Using network appliances to block or filter network traffic that is not necessary within the environment can mitigate adversaries from leveraging externally-facing remote services to initially access and/or persist within a network.
PR.IR-01.02 Network device configurations Mitigates T1187 Forced Authentication
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, protocols) aligned to security baselines. Using network appliances to block or filter network traffic that is not necessary within the environment can mitigate adversaries from obtaining credentials through forced authentication.
PR.IR-01.02 Network device configurations Mitigates T1197 BITS Jobs
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, protocols) aligned to security baselines. Using network appliances to to only allow legitimate BITS traffic can mitigate adversary abuse of BITS Jobs.
PR.IR-01.02 Network device configurations Mitigates T1218.012 Verclsid
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, and protocols) aligned to security baselines. Using network appliances to block or filter network traffic can help to mitigate this technique.
PR.IR-01.02 Network device configurations Mitigates T1219 Remote Access Software
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, and protocols) aligned to security baselines. Using network appliances to block or filter network traffic can mitigate adversary abuse of remote access software.
PR.IR-01.02 Network device configurations Mitigates T1530 Data from Cloud Storage
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, protocols) aligned to security baselines. Employing IP-based restrictions for accessing cloud resources can mitigate adversary access to data in cloud storage.
PR.IR-01.02 Network device configurations Mitigates T1537 Transfer Data to Cloud Account
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, protocols) aligned to security baselines. Employing network-based filtering restrictions can mitigate data transfers to untrusted VPCs.
PR.IR-01.02 Network device configurations Mitigates T1542 Pre-OS Boot
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, and protocols) aligned to security baselines. Using network appliances to limit access can mitigate adversary abuse of pre-OS boot mechanisms.
PR.IR-01.02 Network device configurations Mitigates T1542.005 TFTP Boot
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, and protocols) aligned to security baselines. Employing restrictions on untrusted network sources can mitigate adversary abuse of TFTP boot (netbooting).
PR.IR-01.02 Network device configurations Mitigates T1552 Unsecured Credentials
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, and protocols) aligned to security baselines. Employing restrictions that limit network access and communications with services can prevent adversaries from finding stored credentials.
PR.IR-01.02 Network device configurations Mitigates T1552.005 Cloud Instance Metadata API
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, and protocols) aligned to security baselines. Employing restrictions that limit network access and communications with services can prevent adversaries from finding stored credentials.
PR.IR-01.02 Network device configurations Mitigates T1552.007 Container API
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, and protocols) aligned to security baselines. Employing restrictions that limit network access and communications with services can prevent adversaries from finding stored credentials.
PR.IR-01.02 Network device configurations Mitigates T1557 Adversary-in-the-Middle
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, and protocols) aligned to security baselines. Using network appliances to block or filter network traffic that is not necessary within the environment can prevent leveraging for AiTM conditions.
PR.IR-01.02 Network device configurations Mitigates T1557.002 ARP Cache Poisoning
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, and protocols) aligned to security baselines. Using network appliances to block or filter network traffic that is not necessary within the environment can prevent leveraging for AiTM conditions.
PR.IR-01.02 Network device configurations Mitigates T1563.002 RDP Hijacking
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, and protocols) aligned to security baselines. Using network appliances to limit access can prevent RDP hijacking.
PR.IR-01.02 Network device configurations Mitigates T1572 Protocol Tunneling
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, and protocols) aligned to security baselines. Using network appliances to block or filter network traffic to untrusted or known bad domains and resources can prevent tunnelling of network communications.
PR.IR-01.02 Network device configurations Mitigates T1602 Data from Configuration Repository
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, protocols) aligned to security baselines. Employing extended ACLs to block unauthorized protocols can mitigate adversary access to data in configuration repositories.
PR.IR-01.02 Network device configurations Mitigates T1602.001 SNMP (MIB Dump)
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, protocols) aligned to security baselines. Employing extended ACLs to block unauthorized protocols can mitigate adversary access to data in configuration repositories.
PR.IR-01.02 Network device configurations Mitigates T1602.002 Network Device Configuration Dump
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, protocols) aligned to security baselines. Employing extended ACLs to block unauthorized protocols can mitigate adversary access to data in configuration repositories.
PR.IR-01.02 Network device configurations Mitigates T1609 Container Administration Command
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, and protocols) aligned to security baselines. Using network appliances to limit communications with container services can prevent adversary abuse of container administration.
PR.IR-01.02 Network device configurations Mitigates T1612 Build Image on Host
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, and protocols) aligned to security baselines. Using network appliances to limit communications with container services can prevent adversaries from building container images on hosts.
PR.IR-01.02 Network device configurations Mitigates T1613 Container and Resource Discovery
Comments
This diagnostic statement provides protection through secure network device configurations (e.g., firewall rules, ports, and protocols) aligned to security baselines. Using network appliances to limit communications with container services can prevent adversaries from discovering resources in container environments.
PR.IR-01.03 Network communications integrity and availability Mitigates T1001 Data Obfuscation
Comments
This diagnostic statement protects against Data Obfuscation through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1001.001 Junk Data
Comments
This diagnostic statement protects against Junk Data through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1001.002 Steganography
Comments
This diagnostic statement protects against Steganography through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1001.003 Protocol or Service Impersonation
Comments
This diagnostic statement protects against Protocol or Service Impersonation through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1008 Fallback Channels
Comments
This diagnostic statement protects against Fallback Channels through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1021 Remote Services
Comments
This diagnostic statement protects against Remote Services through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1021.001 Remote Desktop Protocol
Comments
This diagnostic statement protects against Remote Desktop Protocol through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1021.002 SMB/Windows Admin Shares
Comments
This diagnostic statement protects against SMB/Windows Admin Shares through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1021.005 VNC
Comments
This diagnostic statement protects against VNC through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1029 Scheduled Transfer
Comments
This diagnostic statement protects against Scheduled Transfer through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1030 Data Transfer Size Limits
Comments
This diagnostic statement protects against Data Transfer Size Limits through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1041 Exfiltration Over C2 Channel
Comments
This diagnostic statement protects against Exfiltration Over C2 Channel through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1046 Network Service Discovery
Comments
This diagnostic statement protects against Network Service Discovery through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1048 Exfiltration Over Alternative Protocol
Comments
This diagnostic statement protects against Exfiltration Over Alternative Protocol through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1048.001 Exfiltration Over Symmetric Encrypted Non-C2 Protocol
Comments
This diagnostic statement protects against Exfiltration Over Symmetric Encrypted Non-C2 Protocol through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1048.002 Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
Comments
This diagnostic statement protects against Exfiltration Over Asymmetric Encrypted Non-C2 Protocol through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1048.003 Exfiltration Over Unencrypted Non-C2 Protocol
Comments
This diagnostic statement protects against Exfiltration Over Unencrypted Non-C2 Protocol through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1071 Application Layer Protocol
Comments
This diagnostic statement protects against Application Layer Protocol through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1071.001 Web Protocols
Comments
This diagnostic statement protects against Web Protocols through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1071.002 File Transfer Protocols
Comments
This diagnostic statement protects against File Transfer Protocols through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1071.003 Mail Protocols
Comments
This diagnostic statement protects against Mail Protocols through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1071.004 DNS
Comments
This diagnostic statement protects against DNS through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1071.005 Publish/Subscribe Protocols
Comments
This diagnostic statement protects against Publish/Subscribe Protocols through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1090 Proxy
Comments
This diagnostic statement protects against Proxy through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1090.001 Internal Proxy
Comments
This diagnostic statement protects against Internal Proxy through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1090.002 External Proxy
Comments
This diagnostic statement protects against External Proxy through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1090.003 Multi-hop Proxy
Comments
This diagnostic statement protects against Multi-hop Proxy through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1095 Non-Application Layer Protocol
Comments
This diagnostic statement protects against Non-Application Layer Protocol through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1102 Web Service
Comments
This diagnostic statement protects against Web Service through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1102.001 Dead Drop Resolver
Comments
This diagnostic statement protects against Dead Drop Resolver through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1102.002 Bidirectional Communication
Comments
This diagnostic statement protects against Bidirectional Communication through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1102.003 One-Way Communication
Comments
This diagnostic statement protects against One-Way Communication through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1104 Multi-Stage Channels
Comments
This diagnostic statement protects against Multi-Stage Channels through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1105 Ingress Tool Transfer
Comments
This diagnostic statement protects against Ingress Tool Transfer through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1132 Data Encoding
Comments
This diagnostic statement protects against Data Encoding through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1132.001 Standard Encoding
Comments
This diagnostic statement protects against Standard Encoding through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1132.002 Non-Standard Encoding
Comments
This diagnostic statement protects against Non-Standard Encoding through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1133 External Remote Services
Comments
This diagnostic statement protects against External Remote Services through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1187 Forced Authentication
Comments
This diagnostic statement protects against Forced Authentication through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1197 BITS Jobs
Comments
This diagnostic statement protects against BITS Jobs through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1200 Hardware Additions
Comments
This diagnostic statement protects against Hardware Additions through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1204 User Execution
Comments
This diagnostic statement protects against User Execution through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1204.001 Malicious Link
Comments
This diagnostic statement protects against Malicious Link through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1204.003 Malicious Image
Comments
This diagnostic statement protects against Malicious Image through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1205 Traffic Signaling
Comments
This diagnostic statement protects against Traffic Signaling through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1205.001 Port Knocking
Comments
This diagnostic statement protects against Port Knocking through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1205.002 Socket Filters
Comments
This diagnostic statement protects against Socket Filters through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1218 System Binary Proxy Execution
Comments
This diagnostic statement protects against System Binary Proxy Execution through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1218.012 Verclsid
Comments
This diagnostic statement protects against Verclsid through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1219 Remote Access Software
Comments
This diagnostic statement protects against Remote Access Software through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1221 Template Injection
Comments
This diagnostic statement protects against Template Injection through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1498 Network Denial of Service
Comments
This diagnostic statement protects against Network Denial of Service through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1498.001 Direct Network Flood
Comments
This diagnostic statement protects against Direct Network Flood through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1498.002 Reflection Amplification
Comments
This diagnostic statement protects against Reflection Amplification through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1499 Endpoint Denial of Service
Comments
This diagnostic statement protects against Endpoint Denial of Service through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1499.001 OS Exhaustion Flood
Comments
This diagnostic statement protects against OS Exhaustion Flood through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1499.002 Service Exhaustion Flood
Comments
This diagnostic statement protects against Service Exhaustion Flood through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1499.003 Application Exhaustion Flood
Comments
This diagnostic statement protects against Application Exhaustion Flood through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1499.004 Application or System Exploitation
Comments
This diagnostic statement protects against Application or System Exploitation through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1530 Data from Cloud Storage
Comments
This diagnostic statement protects against Data from Cloud Storage through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1537 Transfer Data to Cloud Account
Comments
This diagnostic statement protects against Transfer Data to Cloud Account through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1542 Pre-OS Boot
Comments
This diagnostic statement protects against Pre-OS Boot through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1542.004 ROMMONkit
Comments
This diagnostic statement protects against ROMMONkit through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1542.005 TFTP Boot
Comments
This diagnostic statement protects against TFTP Boot through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1546 Event Triggered Execution
Comments
This diagnostic statement protects against Event Triggered Execution through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1546.008 Accessibility Features
Comments
This diagnostic statement protects against Accessibility Features through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1552 Unsecured Credentials
Comments
This diagnostic statement protects against Unsecured Credentials through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1552.005 Cloud Instance Metadata API
Comments
This diagnostic statement protects against Cloud Instance Metadata API through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1552.007 Container API
Comments
This diagnostic statement protects against Container API through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1557 Adversary-in-the-Middle
Comments
This diagnostic statement protects against Adversary-in-the-Middle through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1557.001 LLMNR/NBT-NS Poisoning and SMB Relay
Comments
This diagnostic statement protects against LLMNR/NBT-NS Poisoning and SMB Relay through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1557.002 ARP Cache Poisoning
Comments
This diagnostic statement protects against ARP Cache Poisoning through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1557.003 DHCP Spoofing
Comments
This diagnostic statement protects against DHCP Spoofing through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1557.004 Evil Twin
Comments
This diagnostic statement protects against Evil Twin through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1563 Remote Service Session Hijacking
Comments
This diagnostic statement protects against Remote Service Session Hijacking through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1563.002 RDP Hijacking
Comments
This diagnostic statement protects against RDP Hijacking through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1566 Phishing
Comments
This diagnostic statement protects against Phishing through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1566.001 Spearphishing Attachment
Comments
This diagnostic statement protects against Spearphishing Attachment through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1568 Dynamic Resolution
Comments
This diagnostic statement protects against Dynamic Resolution through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1568.002 Domain Generation Algorithms
Comments
This diagnostic statement protects against Domain Generation Algorithms through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1570 Lateral Tool Transfer
Comments
This diagnostic statement protects against Lateral Tool Transfer through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1571 Non-Standard Port
Comments
This diagnostic statement protects against Non-Standard Port through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1572 Protocol Tunneling
Comments
This diagnostic statement protects against Protocol Tunneling through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1573 Encrypted Channel
Comments
This diagnostic statement protects against Encrypted Channel through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1573.001 Symmetric Cryptography
Comments
This diagnostic statement protects against Symmetric Cryptography through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1573.002 Asymmetric Cryptography
Comments
This diagnostic statement protects against Asymmetric Cryptography through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1599 Network Boundary Bridging
Comments
This diagnostic statement protects against Network Boundary Bridging through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1599.001 Network Address Translation Traversal
Comments
This diagnostic statement protects against Network Address Translation Traversal through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1602 Data from Configuration Repository
Comments
This diagnostic statement protects against Data from Configuration Repository through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1602.001 SNMP (MIB Dump)
Comments
This diagnostic statement protects against SNMP (MIB Dump) through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1602.002 Network Device Configuration Dump
Comments
This diagnostic statement protects against Network Device Configuration Dump through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1609 Container Administration Command
Comments
This diagnostic statement protects against Container Administration Command through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1610 Deploy Container
Comments
This diagnostic statement protects against Deploy Container through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1612 Build Image on Host
Comments
This diagnostic statement protects against Build Image on Host through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.03 Network communications integrity and availability Mitigates T1613 Container and Resource Discovery
Comments
This diagnostic statement protects against Container and Resource Discovery through the use of secure network configurations, architecture, implementations of zero trust architecture, and segmentation.
PR.IR-01.04 Wireless network protection Mitigates T1021 Remote Services
Comments
This diagnostic statement provides protections for wireless networks. Implementation of wireless network management measures such as network segmentation and access controls reduces the attack surface, restricts movement by adversaries, and protects data from compromise.
PR.IR-01.04 Wireless network protection Mitigates T1021.001 Remote Desktop Protocol
Comments
This diagnostic statement provides protections for wireless networks. Implementation of wireless network management measures such as network segmentation and access controls reduces the attack surface, restricts movement by adversaries, and protects data from compromise.
PR.IR-01.04 Wireless network protection Mitigates T1021.002 SMB/Windows Admin Shares
Comments
This diagnostic statement provides protections for wireless networks. Implementation of wireless network management measures such as network segmentation and access controls reduces the attack surface, restricts movement by adversaries, and protects data from compromise.
PR.IR-01.04 Wireless network protection Mitigates T1021.003 Distributed Component Object Model
Comments
This diagnostic statement provides protections for wireless networks. Implementation of wireless network management measures such as network segmentation and access controls reduces the attack surface, restricts movement by adversaries, and protects data from compromise.
PR.IR-01.04 Wireless network protection Mitigates T1040 Network Sniffing
Comments
This diagnostic statement provides protections for wireless networks. Implementation of wireless network management measures such as network segmentation and access controls reduces the attack surface, restricts movement by adversaries, and protects data from compromise.
PR.IR-01.04 Wireless network protection Mitigates T1046 Network Service Discovery
Comments
This diagnostic statement provides protections for wireless networks. Implementation of wireless network management measures such as network segmentation and access controls reduces the attack surface, restricts movement by adversaries, and protects data from compromise.
PR.IR-01.04 Wireless network protection Mitigates T1048 Exfiltration Over Alternative Protocol
Comments
This diagnostic statement provides protections for wireless networks. Implementation of wireless network management measures such as network segmentation and access controls reduces the attack surface, restricts movement by adversaries, and protects data from compromise.
PR.IR-01.04 Wireless network protection Mitigates T1048.001 Exfiltration Over Symmetric Encrypted Non-C2 Protocol
Comments
This diagnostic statement provides protections for wireless networks. Implementation of wireless network management measures such as network segmentation and access controls reduces the attack surface, restricts movement by adversaries, and protects data from compromise.
PR.IR-01.04 Wireless network protection Mitigates T1048.002 Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
Comments
This diagnostic statement provides protections for wireless networks. Implementation of wireless network management measures such as network segmentation and access controls reduces the attack surface, restricts movement by adversaries, and protects data from compromise.
PR.IR-01.04 Wireless network protection Mitigates T1048.003 Exfiltration Over Unencrypted Non-C2 Protocol
Comments
This diagnostic statement provides protections for wireless networks. Implementation of wireless network management measures such as network segmentation and access controls reduces the attack surface, restricts movement by adversaries, and protects data from compromise.
PR.IR-01.04 Wireless network protection Mitigates T1095 Non-Application Layer Protocol
Comments
This diagnostic statement provides protections for wireless networks. Implementation of wireless network management measures such as network segmentation and access controls reduces the attack surface, restricts movement by adversaries, and protects data from compromise.
PR.IR-01.04 Wireless network protection Mitigates T1200 Hardware Additions
Comments
This diagnostic statement provides protections for wireless networks. Implementation of wireless network management measures such as network segmentation and access controls reduces the attack surface, restricts movement by adversaries, and protects data from compromise.
PR.IR-01.04 Wireless network protection Mitigates T1570 Lateral Tool Transfer
Comments
This diagnostic statement provides protections for wireless networks. Implementation of wireless network management measures such as network segmentation and access controls reduces the attack surface, restricts movement by adversaries, and protects data from compromise.
PR.IR-01.04 Wireless network protection Mitigates T1571 Non-Standard Port
Comments
This diagnostic statement provides protections for wireless networks. Implementation of wireless network management measures such as network segmentation and access controls reduces the attack surface, restricts movement by adversaries, and protects data from compromise.
PR.IR-01.04 Wireless network protection Mitigates T1572 Protocol Tunneling
Comments
This diagnostic statement provides protections for wireless networks. Implementation of wireless network management measures such as network segmentation and access controls reduces the attack surface, restricts movement by adversaries, and protects data from compromise.
PR.IR-01.04 Wireless network protection Mitigates T1573 Encrypted Channel
Comments
This diagnostic statement provides protections for wireless networks. Implementation of wireless network management measures such as network segmentation and access controls reduces the attack surface, restricts movement by adversaries, and protects data from compromise.
PR.IR-01.04 Wireless network protection Mitigates T1573.001 Symmetric Cryptography
Comments
This diagnostic statement provides protections for wireless networks. Implementation of wireless network management measures such as network segmentation and access controls reduces the attack surface, restricts movement by adversaries, and protects data from compromise.
PR.IR-01.04 Wireless network protection Mitigates T1573.002 Asymmetric Cryptography
Comments
This diagnostic statement provides protections for wireless networks. Implementation of wireless network management measures such as network segmentation and access controls reduces the attack surface, restricts movement by adversaries, and protects data from compromise.
PR.IR-01.05 Remote access protection Mitigates T1542 Pre-OS Boot
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1542.005 TFTP Boot
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1546 Event Triggered Execution
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1546.003 Windows Management Instrumentation Event Subscription
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1552 Unsecured Credentials
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1552.002 Credentials in Registry
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1552.007 Container API
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1556 Modify Authentication Process
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1556.001 Domain Controller Authentication
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1563 Remote Service Session Hijacking
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1563.002 RDP Hijacking
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1609 Container Administration Command
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1611 Escape to Host
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1612 Build Image on Host
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.05 Remote access protection Mitigates T1621 Multi-Factor Authentication Request Generation
Comments
This diagnostic statement implements security controls and restrictions for remote user access to systems. Remote user access control involves managing and securing how users remotely access systems, such as through encrypted connections and account use policies, which help prevent adversary access.
PR.IR-01.06 Production environment segregation Mitigates T1021 Remote Services
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1021.002 SMB/Windows Admin Shares
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1021.003 Distributed Component Object Model
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1021.006 Windows Remote Management
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1021.007 Cloud Services
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1046 Network Service Discovery
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1059 Command and Scripting Interpreter
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1059.001 PowerShell
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1059.008 Network Device CLI
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1059.009 Cloud API
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1072 Software Deployment Tools
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1095 Non-Application Layer Protocol
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1098 Account Manipulation
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1098.001 Additional Cloud Credentials
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1098.002 Additional Email Delegate Permissions
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1098.003 Additional Cloud Roles
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1134 Access Token Manipulation
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1136 Create Account
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1190 Exploit Public-Facing Application
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1199 Trusted Relationship
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1210 Exploitation of Remote Services
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1218 System Binary Proxy Execution
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1218.007 Msiexec
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1495 Firmware Corruption
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1505 Server Software Component
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1505.004 IIS Components
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1542 Pre-OS Boot
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1542.001 System Firmware
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1542.003 Bootkit
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1543 Create or Modify System Process
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1543.002 Systemd Service
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1546.008 Accessibility Features
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1546 Event Triggered Execution
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1547.006 Kernel Modules and Extensions
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1548 Abuse Elevation Control Mechanism
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1548.006 TCC Manipulation
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1550 Use Alternate Authentication Material
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1550.002 Pass the Hash
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1550.003 Pass the Ticket
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1552 Unsecured Credentials
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1552.005 Cloud Instance Metadata API
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1552.007 Container API
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1553 Subvert Trust Controls
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1553.006 Code Signing Policy Modification
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1555 Credentials from Password Stores
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1557 Adversary-in-the-Middle
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1557.001 LLMNR/NBT-NS Poisoning and SMB Relay
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1557.002 ARP Cache Poisoning
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1559 Inter-Process Communication
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1559.001 Component Object Model
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1563 Remote Service Session Hijacking
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1563.002 RDP Hijacking
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1602 Data from Configuration Repository
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1602.001 SNMP (MIB Dump)
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1602.002 Network Device Configuration Dump
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1606 Forge Web Credentials
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1606.002 SAML Tokens
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1609 Container Administration Command
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.06 Production environment segregation Mitigates T1611 Escape to Host
Comments
This diagnostic statement provides protections for production environments. Measures such as network segmentation and access control reduce the attack surface, restrict movement by adversaries, and protect critical assets and data from compromise.
PR.IR-01.08 End-user device access Mitigates T1547.006 Kernel Modules and Extensions
Comments
This diagnostic statement implements technical controls (e.g., VPN, antivirus software) to address the risks of end-user personal computing devices accessing the organization’s network and resources.
PR.PS-01.08 End-user device protection Mitigates T1021 Remote Services
Comments
This diagnostic statement protects against Remote Services through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1021.001 Remote Desktop Protocol
Comments
This diagnostic statement protects against Remote Desktop Protocol through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1021.002 SMB/Windows Admin Shares
Comments
This diagnostic statement protects against SMB/Windows Admin Shares through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1021.005 VNC
Comments
This diagnostic statement protects against VNC through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1027 Obfuscated Files or Information
Comments
This diagnostic statement protects against Obfuscated Files or Information through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1027.002 Software Packing
Comments
This diagnostic statement protects against Software Packing through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1027.009 Embedded Payloads
Comments
This diagnostic statement protects against Embedded Payloads through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1027.010 Command Obfuscation
Comments
This diagnostic statement protects against Command Obfuscation through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1027.012 LNK Icon Smuggling
Comments
This diagnostic statement protects against LNK Icon Smuggling through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1027.013 Encrypted/Encoded File
Comments
This diagnostic statement protects against Encrypted/Encoded File through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1027.014 Polymorphic Code
Comments
This diagnostic statement protects against Polymorphic Code through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1036 Masquerading
Comments
This diagnostic statement protects against Masquerading through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1036.008 Masquerade File Type
Comments
This diagnostic statement protects against Masquerade File Type through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1048 Exfiltration Over Alternative Protocol
Comments
This diagnostic statement protects against Exfiltration Over Alternative Protocol through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1048.001 Exfiltration Over Symmetric Encrypted Non-C2 Protocol
Comments
This diagnostic statement protects against Exfiltration Over Symmetric Encrypted Non-C2 Protocol through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1048.002 Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
Comments
This diagnostic statement protects against Exfiltration Over Asymmetric Encrypted Non-C2 Protocol through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1048.003 Exfiltration Over Unencrypted Non-C2 Protocol
Comments
This diagnostic statement protects against Exfiltration Over Unencrypted Non-C2 Protocol through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1052 Exfiltration Over Physical Medium
Comments
This diagnostic statement protects against Exfiltration Over Physical Medium through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1052.001 Exfiltration over USB
Comments
This diagnostic statement protects against Exfiltration over USB through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1059 Command and Scripting Interpreter
Comments
This diagnostic statement protects against Command and Scripting Interpreter through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1059.001 PowerShell
Comments
This diagnostic statement protects against PowerShell through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1059.005 Visual Basic
Comments
This diagnostic statement protects against Visual Basic through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1059.006 Python
Comments
This diagnostic statement protects against Python through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1071 Application Layer Protocol
Comments
This diagnostic statement protects against Application Layer Protocol through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1071.004 DNS
Comments
This diagnostic statement protects against DNS through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1071.005 Publish/Subscribe Protocols
Comments
This diagnostic statement protects against Publish/Subscribe Protocols through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1080 Taint Shared Content
Comments
This diagnostic statement protects against Taint Shared Content through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1090 Proxy
Comments
This diagnostic statement protects against Proxy through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1090.003 Multi-hop Proxy
Comments
This diagnostic statement protects against Multi-hop Proxy through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1091 Replication Through Removable Media
Comments
This diagnostic statement protects against Replication Through Removable Media through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1095 Non-Application Layer Protocol
Comments
This diagnostic statement protects against Non-Application Layer Protocol through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1133 External Remote Services
Comments
This diagnostic statement protects against External Remote Services through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1187 Forced Authentication
Comments
This diagnostic statement protects against Forced Authentication through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1190 Exploit Public-Facing Application
Comments
This diagnostic statement protects against Exploit Public-Facing Application through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1197 BITS Jobs
Comments
This diagnostic statement protects against BITS Jobs through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1200 Hardware Additions
Comments
This diagnostic statement protects against Hardware Additions through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1205 Traffic Signaling
Comments
This diagnostic statement protects against Traffic Signaling through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1205.001 Port Knocking
Comments
This diagnostic statement protects against Port Knocking through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1205.002 Socket Filters
Comments
This diagnostic statement protects against Socket Filters through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1218 System Binary Proxy Execution
Comments
This diagnostic statement protects against System Binary Proxy Execution through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1218.012 Verclsid
Comments
This diagnostic statement protects against Verclsid through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1219 Remote Access Software
Comments
This diagnostic statement protects against Remote Access Software through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1221 Template Injection
Comments
This diagnostic statement protects against Template Injection through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1498 Network Denial of Service
Comments
This diagnostic statement protects against Network Denial of Service through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1498.001 Direct Network Flood
Comments
This diagnostic statement protects against Direct Network Flood through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1498.002 Reflection Amplification
Comments
This diagnostic statement protects against Reflection Amplification through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1499 Endpoint Denial of Service
Comments
This diagnostic statement protects against Endpoint Denial of Service through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1499.001 OS Exhaustion Flood
Comments
This diagnostic statement protects against OS Exhaustion Flood through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1499.002 Service Exhaustion Flood
Comments
This diagnostic statement protects against Service Exhaustion Flood through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1499.003 Application Exhaustion Flood
Comments
This diagnostic statement protects against Application Exhaustion Flood through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1499.004 Application or System Exploitation
Comments
This diagnostic statement protects against Application or System Exploitation through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1530 Data from Cloud Storage
Comments
This diagnostic statement protects against Data from Cloud Storage through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1537 Transfer Data to Cloud Account
Comments
This diagnostic statement protects against Transfer Data to Cloud Account through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1542 Pre-OS Boot
Comments
This diagnostic statement protects against Pre-OS Boot through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1542.005 TFTP Boot
Comments
This diagnostic statement protects against TFTP Boot through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1546 Event Triggered Execution
Comments
This diagnostic statement protects against Event Triggered Execution through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1546.008 Accessibility Features
Comments
This diagnostic statement protects against Accessibility Features through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1547 Boot or Logon Autostart Execution
Comments
This diagnostic statement protects against Boot or Logon Autostart Execution through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1547.006 Kernel Modules and Extensions
Comments
This diagnostic statement protects against Kernel Modules and Extensions through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1552 Unsecured Credentials
Comments
This diagnostic statement protects against Unsecured Credentials through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1552.005 Cloud Instance Metadata API
Comments
This diagnostic statement protects against Cloud Instance Metadata API through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1552.007 Container API
Comments
This diagnostic statement protects against Container API through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1557 Adversary-in-the-Middle
Comments
This diagnostic statement protects against Adversary-in-the-Middle through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1557.001 LLMNR/NBT-NS Poisoning and SMB Relay
Comments
This diagnostic statement protects against LLMNR/NBT-NS Poisoning and SMB Relay through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1557.002 ARP Cache Poisoning
Comments
This diagnostic statement protects against ARP Cache Poisoning through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1557.003 DHCP Spoofing
Comments
This diagnostic statement protects against DHCP Spoofing through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1563 Remote Service Session Hijacking
Comments
This diagnostic statement protects against Remote Service Session Hijacking through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1563.002 RDP Hijacking
Comments
This diagnostic statement protects against RDP Hijacking through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1564 Hide Artifacts
Comments
This diagnostic statement protects against Hide Artifacts through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1564.012 File/Path Exclusions
Comments
This diagnostic statement protects against File/Path Exclusions through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1566.001 Spearphishing Attachment
Comments
This diagnostic statement protects against Spearphishing Attachment through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1566.003 Spearphishing via Service
Comments
This diagnostic statement protects against Spearphishing via Service through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1570 Lateral Tool Transfer
Comments
This diagnostic statement protects against Lateral Tool Transfer through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1572 Protocol Tunneling
Comments
This diagnostic statement protects against Protocol Tunneling through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1599 Network Boundary Bridging
Comments
This diagnostic statement protects against Network Boundary Bridging through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1599.001 Network Address Translation Traversal
Comments
This diagnostic statement protects against Network Address Translation Traversal through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1602 Data from Configuration Repository
Comments
This diagnostic statement protects against Data from Configuration Repository through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1602.001 SNMP (MIB Dump)
Comments
This diagnostic statement protects against SNMP (MIB Dump) through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1602.002 Network Device Configuration Dump
Comments
This diagnostic statement protects against Network Device Configuration Dump through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1609 Container Administration Command
Comments
This diagnostic statement protects against Container Administration Command through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1610 Deploy Container
Comments
This diagnostic statement protects against Deploy Container through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1612 Build Image on Host
Comments
This diagnostic statement protects against Build Image on Host through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.
PR.PS-01.08 End-user device protection Mitigates T1613 Container and Resource Discovery
Comments
This diagnostic statement protects against Container and Resource Discovery through the use of limiting access to resources to only authorized devices, management of personal computing devices, network intrusion prevention, and the use of antimalware.

Capabilities

Capability ID Capability Name Number of Mappings
PR.IR-01.04 Wireless network protection 20
PR.IR-03.01 Alternative resilience mechanisms 23
PR.IR-01.03 Network communications integrity and availability 95
PR.IR-01.01 Network segmentation 40
PR.IR-04.01 Utilization monitoring 39
PR.IR-01.05 Remote access protection 77
PR.PS-01.08 End-user device protection 108
PR.IR-01.08 End-user device access 19
PR.IR-04.02 Availability and capacity management 12
PR.IR-01.06 Production environment segregation 78
PR.IR-01.02 Network device configurations 39