Provide cryptographic protection to data at-rest and in-transit, using cryptographic libraries certified to approved standards.
| Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
|---|---|---|---|---|---|
| CEK-03 | Data Encryption | mitigates | T1550.001 | Application Access Token |
Comments
This control provides cryptographic protection for data-at-rest and data-in-transit within the cloud environment. Encryption ensures the confidentiality and integrity of data, such as OAuth access tokens used in a cloud-based email service. File encryption across email communications containing sensitive information that may be obtained through access to email services can help prevent adversaries from stealing application access tokens.
|
| CEK-03 | Data Encryption | mitigates | T1557.002 | ARP Cache Poisoning |
Comments
This control provides cryptographic protection for data-at-rest and data-in-transit within the cloud environment. Encryption ensures the confidentiality and integrity of data, preventing unauthorized access or tampering. Ensuring that all wireless traffic is encrypted appropriately can safeguard ARP traffic and mitigate adversary use of ARP cache poisoning.
|
| CEK-03 | Data Encryption | mitigates | T1669 | Wi-Fi Networks |
Comments
This control provides cryptographic protection for data-at-rest and data-in-transit within the cloud environment. Encryption ensures the confidentiality and integrity of data, preventing unauthorized access or tampering. Ensuring that cloud-managed Wi-Fi or cloud-based networking traffic is encrypted appropriately can mitigate adversary exploitation of Wi-Fi networks.
|
| CEK-03 | Data Encryption | mitigates | T1552.004 | Private Keys |
Comments
This control provides cryptographic protection for data-at-rest within the cloud environment. Encryption ensures the confidentiality of data such as credentials, preventing unauthorized access. When possible, keys should be stored on separate cryptographic hardware instead of on the local system.
|
| CEK-03 | Data Encryption | mitigates | T1552 | Unsecured Credentials |
Comments
This control provides cryptographic protection for data-at-rest within the cloud environment. Encryption ensures the confidentiality of data such as credentials, preventing unauthorized access. When possible, keys should be stored on separate cryptographic hardware instead of on the local system.
|
| CEK-03 | Data Encryption | mitigates | T1649 | Steal or Forge Authentication Certificates |
Comments
This control provides cryptographic protection for data-at-rest within the cloud environment. Encryption ensures the confidentiality of data such as credentials, preventing unauthorized access. Ensuring certificates as well as associated private keys are appropriately secured and enforcing HTTPS can help prevent adversaries from stealing or forging certificates used for authentication.
|
| CEK-03 | Data Encryption | mitigates | T1565.002 | Transmitted Data Manipulation |
Comments
This control provides cryptographic protection for data-in-transit within the cloud environment. Encryption ensures the confidentiality and integrity of data, preventing unauthorized access or tampering. Encrypting important data flows reduces the impact of adversary tailored data modifications.
|
| CEK-03 | Data Encryption | mitigates | T1565.001 | Stored Data Manipulation |
Comments
This control provides cryptographic protection for data-at-rest within the cloud environment. Encryption ensures the confidentiality and integrity of data, preventing unauthorized access or tampering. Encrypting important information reduces an adversary’s ability to perform tailored data modifications.
|
| CEK-03 | Data Encryption | mitigates | T1565 | Data Manipulation |
Comments
This control provides cryptographic protection for data-at-rest and data-in-transit within the cloud environment. Encryption ensures the confidentiality and integrity of data, preventing unauthorized access or tampering. Encrypting important information reduces an adversary’s ability to perform tailored data modifications.
|
| CEK-03 | Data Encryption | mitigates | T1020.001 | Traffic Duplication |
Comments
This control provides cryptographic protection for data-at-rest and data-in-transit within the cloud environment. Ensuring that all wireless traffic is encrypted appropriately can mitigate adversary abuse of traffic mirroring for redirection of network traffic and automated data exfiltration.
|
| CEK-03 | Data Encryption | mitigates | T1119 | Automated Collection |
Comments
This control provides cryptographic protection for data-at-rest and data-in-transit within the cloud environment. Encryption and off-system storage of sensitive information ensures the confidentiality of data and can help to mitigate adversary use of automated techniques for automatically collecting data and files.
|
| CEK-03 | Data Encryption | mitigates | T1557 | Adversary-in-the-Middle |
Comments
This control provides cryptographic protection for data-in-transit within the cloud environment. Encryption ensures the confidentiality and integrity of data, preventing unauthorized access or tampering. Ensuring that all wireless traffic is encrypted appropriately can safeguard data and mitigate adversary-in-the-middle activities such as information collection.
|
| CEK-03 | Data Encryption | mitigates | T1213 | Data from Information Repositories |
Comments
This control provides cryptographic protection for data-at-rest within the cloud environment. Encrypting data stored at rest in information repositories ensures the confidentiality of data and can mitigate adversary access to information of value, such as sensitive documents or data that may aid their further objectives.
|
| CEK-03 | Data Encryption | mitigates | T1530 | Data from Cloud Storage |
Comments
This control provides mechanisms for encryption of at-rest data, and for managing encryption keys securely, ensuring they are regularly rotated and not exposed to unauthorized parties. Encrypting data stored at rest in cloud storage and rotating managed encryption keys can mitigate adversary access to data from cloud storage.
|