Define, implement and evaluate processes, procedures and technical and/or contractual measures to maintain proper security of third-party endpoints with access to organizational assets.
| Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
|---|---|---|---|---|---|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1204.003 | Malicious Image |
Comments
This control provides for the implementation of best practices for third-party endpoint management.
Several cloud service providers support content trust models that require container images be signed by trusted sources. Malicious images can be prevented from running by implementing application control, script blocking, and other runtime execution prevention mechanisms from untrusted sources .
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1204 | User Execution |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Malicious executables can be prevented from running by implementing application control, script blocking, and other execution prevention mechanisms.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1562.001 | Disable or Modify Tools |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Malicious modification or disabling of security tools can be mitigated by implementing application control, script blocking, and other execution prevention mechanisms.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1059 | Command and Scripting Interpreter |
Comments
This control provides for the implementation of best practices for third-party endpoint management. The execution of unauthorized or malicious code on systems through abuse of command and script interpreters can be prevented by implementing application control, script blocking, and other execution prevention mechanisms.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1059.009 | Cloud API |
Comments
This control provides for the implementation of best practices for third-party endpoint management. The execution of unauthorized or malicious code on systems through abuse of command and script interpreters can be prevented by implementing application control, script blocking, and other execution prevention mechanisms.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1080 | Taint Shared Content |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Endpoint exploit protection capabilities can be used to detect, block, and mitigate conditions indicative of exploits to taint content in shared storage locations.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1211 | Exploitation for Defense Evasion |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Endpoint exploit protection capabilities can be used to detect, block, and mitigate conditions indicative of exploits to bypass security features.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1552 | Unsecured Credentials |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Endpoint exploit protection capabilities can be used to detect, block, and mitigate conditions indicative of exploits of public-facing applications.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1490 | Inhibit System Recovery |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Proper security configurations, limited system access, and application control can help mitigate the risk of adversaries deleting or removing built-in data and turning off services designed to aid in the recovery of a corrupted system.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1136 | Create Account |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Proper security configurations and limited system access can help prevent adversaries from creating accounts to maintain access.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1098 | Account Manipulation |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Proper security configurations and limited system access can help prevent adversaries from manipulating accounts to maintain and/or elevate access.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1087 | Account Discovery |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Adjusting access to user lists can prevent abuse of system functionality and help prevent adversaries from getting a listing of valid accounts or usernames.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1548 | Abuse Elevation Control Mechanism |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Adjusting system settings and hardening default configurations can mitigate adversary exploitation of elevation control mechanisms and prevent abuse of system functionality.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1550.004 | Web Session Cookie |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Configuring applications to delete persistent web cookies to help mitigate the risk of adversaries using stolen session cookies.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1535 | Unused/Unsupported Cloud Regions |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Cloud service providers may allow customers to deactivate unused regions to help mitigate the risk of adversaries creating resources in unused regions.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1537 | Transfer Data to Cloud Account |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Configuring appropriate data sharing restrictions in cloud services can help mitigate the risk of adversaries exfiltrating data by transferring.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1666 | Modify Cloud Resource Hierarchy |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Securing resource groups and limiting permissions can help mitigate the risk of adversaries adding, deleting, or otherwise modifying hierarchical structures.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1562 | Impair Defenses |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Preventing insecure connections and ensuring proper permissions can help mitigate the risk of adversaries hindering or disabling preventative defenses.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1606.001 | Web Cookies |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Configuring applications to delete persistent web credentials and limiting privileges can help mitigate the risk of adversaries generating and using forged web cookies.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1213.004 | Customer Relationship Management Software |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Effectively securing information repositories and enforcing robust data retention policies can mitigate the risk of adversaries exploiting information repositories to access sensitive or valuable information.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1606 | Forge Web Credentials |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Configuring applications to delete persistent web credentials and limiting privileges can help mitigate the risk of adversaries generating and using forged web credentials.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1213 | Data from Information Repositories |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Effectively securing information repositories and enforcing robust data retention policies can mitigate the risk of adversaries exploiting information repositories to access sensitive or valuable information.
|