| Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
|---|---|---|---|---|---|
| I&S-07 | Migration to Cloud Environments | mitigates | T1213 | Data from Information Repositories |
Comments
This control provides for the use of secure and encrypted communication
channels when migrating to cloud environments. Encrypting data at all stages, from storage to transmission, ensures the confidentiality of data and can mitigate adversary access to information of value, such as sensitive documents or data that may aid their further objectives.
|
| I&S-07 | Migration to Cloud Environments | mitigates | T1550.001 | Application Access Token |
Comments
This control provides for the use of secure and encrypted communication
channels when migrating to cloud environments. Encryption ensures the confidentiality and integrity of data, such as OAuth access tokens used in a cloud-based email service. File encryption across email communications containing sensitive information that may be obtained through access to email services can help prevent adversaries from stealing application access tokens.
|
| I&S-07 | Migration to Cloud Environments | mitigates | T1557.002 | ARP Cache Poisoning |
Comments
This control provides for the use of secure and encrypted communication
channels when migrating to cloud environments. Encryption ensures the confidentiality and integrity of data, preventing unauthorized access or tampering. Ensuring that all wireless traffic is encrypted appropriately can safeguard ARP traffic and mitigate adversary use of ARP cache poisoning.
|
| I&S-07 | Migration to Cloud Environments | mitigates | T1552.004 | Private Keys |
Comments
This control provides for the use of secure and encrypted communication
channels when migrating to cloud environments. Encrypting data at all stages, from storage to transmission, ensures the confidentiality of data such as credentials, preventing unauthorized access.
|
| I&S-07 | Migration to Cloud Environments | mitigates | T1552 | Unsecured Credentials |
Comments
This control provides for the use of secure and encrypted communication
channels when migrating to cloud environments. Encrypting data at all stages, from storage to transmission, ensures the confidentiality of data such as credentials, preventing unauthorized access.
|
| I&S-07 | Migration to Cloud Environments | mitigates | T1649 | Steal or Forge Authentication Certificates |
Comments
This control provides for the use of secure and encrypted communication
channels when migrating to cloud environments. Encrypting data at all stages, from storage to transmission, ensures the confidentiality of data such as credentials, preventing unauthorized access.
|
| I&S-07 | Migration to Cloud Environments | mitigates | T1565.002 | Transmitted Data Manipulation |
Comments
This control provides for the use of secure and encrypted communication
channels when migrating to cloud environments. Encryption ensures the confidentiality and integrity of data, preventing unauthorized access or tampering. Encrypting important data flows reduces the impact of adversary tailored data modifications.
|
| I&S-07 | Migration to Cloud Environments | mitigates | T1565.001 | Stored Data Manipulation |
Comments
This control provides for the use of secure and encrypted communication
channels when migrating to cloud environments. Encrypting data at all stages, from storage to transmission, ensures the confidentiality and integrity of data, preventing unauthorized access or tampering. Encrypting important information reduces an adversary’s ability to perform tailored data modifications.
|
| I&S-07 | Migration to Cloud Environments | mitigates | T1565 | Data Manipulation |
Comments
This control provides for the use of secure and encrypted communication
channels when migrating to cloud environments. Encryption ensures the confidentiality and integrity of data, preventing unauthorized access or tampering. Encrypting important information reduces an adversary’s ability to perform tailored data modifications.
|
| I&S-07 | Migration to Cloud Environments | mitigates | T1020.001 | Traffic Duplication |
Comments
This control provides for the use of secure and encrypted communication
channels when migrating to cloud environments. Ensuring that all wireless traffic is encrypted appropriately can mitigate adversary abuse of traffic mirroring for redirection of network traffic and automated data exfiltration.
|
| I&S-07 | Migration to Cloud Environments | mitigates | T1119 | Automated Collection |
Comments
This control provides for the use of secure and encrypted communication
channels when migrating to cloud environments. Encrypting data at all stages, from storage to transmission, ensures the confidentiality of data and can help to mitigate adversary use of automated techniques for automatically collecting data and files.
|
| I&S-07 | Migration to Cloud Environments | mitigates | T1557 | Adversary-in-the-Middle |
Comments
This control provides for the use of secure and encrypted communication
channels when migrating to cloud environments. Encryption ensures the confidentiality and integrity of data, preventing unauthorized access or tampering. Ensuring that all wireless traffic is encrypted appropriately can safeguard data and mitigate adversary-in-the-middle activities such as information collection.
|
| I&S-07 | Migration to Cloud Environments | mitigates | T1530 | Data from Cloud Storage |
Comments
This control provides for the use of secure and encrypted communication
channels when migrating to cloud environments. Encrypting data at all stages, from storage to transmission, ensures the confidentiality of data and can mitigate adversary access to information of value in cloud storage.
|