Define, implement and evaluate processes, procedures and technical measures that ensure any transfer of personal or sensitive data is protected from unauthorized access and only processed within scope as permitted by the respective laws and regulations.
| Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
|---|---|---|---|---|---|
| DSP-10 | Sensitive Data Transfer | mitigates | T1020.001 | Traffic Duplication |
Comments
The control describes the implementation of strong technical and procedural safeguards, such as TLS with strong keys)to protect sensitive data during transfer and prevent unauthorized access or interception. For this technique, adversaries may leverage traffic mirroring in order to automate data exfiltration over compromised infrastructure. Many cloud-based environments also support traffic mirroring. For example, AWS Traffic Mirroring, GCP Packet Mirroring, and Azure vTap allow users to define specified instances to collect traffic from and specified targets to send collected traffic to. Ensure that all wired and/or wireless traffic is encrypted appropriately. Use best practices for authentication protocols, such as Kerberos, and ensure web traffic that may contain credentials is protected by SSL/TLS.
|
| DSP-10 | Sensitive Data Transfer | mitigates | T1669 | Wi-Fi Networks |
Comments
The control describes the implementation of strong technical and procedural safeguards, such as TLS with strong keys)to protect sensitive data during transfer and prevent unauthorized access or interception. For this technique, Ensure that all wired and/or wireless traffic is encrypted appropriately. Use best practices for authentication protocols, such as Kerberos, and ensure web traffic that may contain credentials is protected by SSL/TLS. Further mitigation may include separating networking environments for Wi-Fi and Ethernet-wired networks for access to sensitive resources.
|
| DSP-10 | Sensitive Data Transfer | mitigates | T1537 | Transfer Data to Cloud Account |
Comments
The control describes the implementation of strong technical and procedural safeguards, such as TLS with strong keys)to protect sensitive data during transfer and prevent unauthorized access or interception. For this technique, consider implementing network-based filtering restrictions to prohibit data transfers to untrusted VPCs as a possible mitigation. Adversaries may exfiltrate data by transferring the data, including through sharing/syncing and creating backups of cloud environments, to another cloud account they control on the same service.
|
| DSP-10 | Sensitive Data Transfer | mitigates | T1530 | Data from Cloud Storage |
Comments
The control describes the implementation of strong technical and procedural safeguards, such as TLS with strong keys)to protect sensitive data during transfer and prevent unauthorized access or interception. For this technique, adversaries may collect on and exfiltrate on sensitive data stored in cloud storage. In terms of mitigation, the use of IP allowlisting along with user account management to ensure that data access is restricted not only to valid users but only from expected IP ranges could mitigate the use of stolen credentials to access data.
|
| DSP-10 | Sensitive Data Transfer | mitigates | T1048 | Exfiltration Over Alternative Protocol |
Comments
The control describes the implementation of strong technical and procedural safeguards, such as TLS with strong keys)to protect sensitive data during transfer and prevent unauthorized access or interception. For this technique, adversaries may steal sensitive data by exfiltrating it over a different protocol than that of the existing command and control channel. In terms of mitigation, the use of IP allowlisting along with user account management to ensure that data access is restricted not only to valid users but only from expected IP ranges could mitigate the use of stolen credentials to access data.
|
| DSP-10 | Sensitive Data Transfer | mitigates | T1550.001 | Application Access Token |
Comments
The control describes the implementation of strong technical and procedural safeguards, such as TLS with strong keys)to protect sensitive data during transfer and prevent unauthorized access or interception. For this technique, file encryption should be enforced across email communications containing sensitive information that may be obtained through access to email services. Adversaries may use stolen application access tokens to bypass the typical authentication process and access restricted accounts, information, or services on remote systems.
|
| DSP-10 | Sensitive Data Transfer | mitigates | T1040 | Network Sniffing |
Comments
The control describes the implementation of strong technical and procedural safeguards, such as TLS with strong keys)to protect sensitive data during transfer and prevent unauthorized access or interception. For this technique, ensure that all wired and/or wireless traffic is encrypted appropriately. Use best practices for authentication protocols, such as Kerberos, and ensure web traffic that may contain credentials is protected by SSL/TLS.
|
| DSP-10 | Sensitive Data Transfer | mitigates | T1114.003 | Email Forwarding Rule |
Comments
The control describes the implementation of strong technical and procedural safeguards, such as TLS with strong keys)to protect sensitive data during transfer and prevent unauthorized access or interception. For this technique, the use of encryption provides an added layer of security to sensitive information sent over email.
|
| DSP-10 | Sensitive Data Transfer | mitigates | T1114.002 | Remote Email Collection |
Comments
The control describes the implementation of strong technical and procedural safeguards, such as TLS with strong keys)to protect sensitive data during transfer and prevent unauthorized access or interception. For this technique, the use of encryption provides an added layer of security to sensitive information sent over email.
|
| DSP-10 | Sensitive Data Transfer | mitigates | T1114.001 | Local Email Collection |
Comments
The control describes the implementation of strong technical and procedural safeguards, such as TLS with strong keys)to protect sensitive data during transfer and prevent unauthorized access or interception. For this technique, the use of encryption provides an added layer of security to sensitive information sent over email.
|
| DSP-10 | Sensitive Data Transfer | mitigates | T1114 | Email Collection |
Comments
The control describes the implementation of strong technical and procedural safeguards, such as TLS with strong keys)to protect sensitive data during transfer and prevent unauthorized access or interception. For this technique, the use of encryption provides an added layer of security to sensitive information sent over email.
|
| DSP-10 | Sensitive Data Transfer | mitigates | T1565.003 | Runtime Data Manipulation |
Comments
The control describes the implementation of strong technical and procedural safeguards, such as TLS with strong keys)to protect sensitive data during transfer and prevent unauthorized access or interception. For this technique, encrypt all important data flows to reduce the impact of tailored modifications on data in transit. Also, In cloud environments, use VPCs, subnets, and security groups to isolate applications and enforce traffic rules on those systems to mitigate any against unauthorized access and tampering.
|
| DSP-10 | Sensitive Data Transfer | mitigates | T1565.002 | Transmitted Data Manipulation |
Comments
The control describes the implementation of strong technical and procedural safeguards, such as TLS with strong keys)to protect sensitive data during transfer and prevent unauthorized access or interception. For this technique, encrypt all important data flows to reduce the impact of tailored modifications on data in transit. Also, In cloud environments, use VPCs, subnets, and security groups to isolate applications and enforce traffic rules on those systems to mitigate any against unauthorized access and tampering.
|
| DSP-10 | Sensitive Data Transfer | mitigates | T1565 | Data Manipulation |
Comments
The control describes the implementation of strong technical and procedural safeguards, such as TLS with strong keys)to protect sensitive data during transfer and prevent unauthorized access or interception. For this technique, encrypt all important data flows to reduce the impact of tailored modifications on data in transit. Also, In cloud environments, use VPCs, subnets, and security groups to isolate applications and enforce traffic rules on those systems to mitigate any against unauthorized access and tampering.
|
| DSP-10 | Sensitive Data Transfer | mitigates | T1020 | Automated Exfiltration |
Comments
The control describes the implementation of strong technical and procedural safeguards, such as TLS with strong keys)to protect sensitive data during transfer and prevent unauthorized access or interception. For this technique, encryption and off-system storage of sensitive information may be one way to mitigate the successful exfiltration of files.
|
| DSP-10 | Sensitive Data Transfer | mitigates | T1119 | Automated Collection |
Comments
The control describes the implementation of strong technical and procedural safeguards, such as TLS with strong keys)to protect sensitive data during transfer and prevent unauthorized access or interception. For this technique, encryption and off-system storage of sensitive information may be one way to mitigate collection of files.
|