The Universal Endpoint Management (UEM) domain focuses on implementing controls to mitigate the risks associated with endpoints, including mobile devices. The risk with mobile computing and endpoint security mainly relates to user behavior and the awareness (or lack of awareness) of a company’s approach to acceptable use of devices and technologies (e.g., managed vs. unmanaged, enterprise-owned vs. personal).
| Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
|---|---|---|---|---|---|
| UEM-08 | Storage Encryption | mitigates | T1552.004 | Private Keys |
Comments
This control provides for implementation of endpoint storage encryption. Encryption ensures the confidentiality of data such as credentials, preventing unauthorized access. When possible, keys should be stored on separate cryptographic hardware instead of on the local system.
|
| UEM-08 | Storage Encryption | mitigates | T1552 | Unsecured Credentials |
Comments
This control provides for implementation of endpoint storage encryption. Encryption ensures the confidentiality of data such as credentials, preventing unauthorized access. When possible, keys should be stored on separate cryptographic hardware instead of on the local system.
|
| UEM-08 | Storage Encryption | mitigates | T1649 | Steal or Forge Authentication Certificates |
Comments
This control provides for implementation of endpoint storage encryption. Encryption ensures the confidentiality of data such as credentials, preventing unauthorized access. Ensuring certificates as well as associated private keys are appropriately secured and enforcing HTTPS can help prevent adversaries from stealing or forging certificates used for authentication.
|
| UEM-08 | Storage Encryption | mitigates | T1565.001 | Stored Data Manipulation |
Comments
This control provides for implementation of endpoint storage encryption. Encryption ensures the confidentiality and integrity of data, preventing unauthorized access or tampering. Encrypting important information reduces an adversary’s ability to perform tailored data modifications.
|
| UEM-08 | Storage Encryption | mitigates | T1565 | Data Manipulation |
Comments
This control provides for implementation of endpoint storage encryption. Encryption ensures the confidentiality and integrity of data, preventing unauthorized access or tampering. Encrypting important information reduces an adversary’s ability to perform tailored data modifications.
|
| UEM-08 | Storage Encryption | mitigates | T1119 | Automated Collection |
Comments
This control provides for implementation of endpoint storage encryption. Encryption and off-system storage of sensitive information ensures the confidentiality of data and can help to mitigate adversary use of automated techniques for automatically collecting data and files.
|
| UEM-08 | Storage Encryption | mitigates | T1213 | Data from Information Repositories |
Comments
This control provides for implementation of endpoint storage encryption. Encrypting data stored at rest in information repositories ensures the confidentiality of data and can mitigate adversary access to information of value, such as sensitive documents or data that may aid their further objectives.
|
| UEM-08 | Storage Encryption | mitigates | T1530 | Data from Cloud Storage |
Comments
This control provides for implementation of endpoint storage encryption. Encrypting data stored at rest in cloud storage can mitigate adversary access to data from cloud storage.
|
| UEM-05 | Endpoint Management | mitigates | T1204 | User Execution |
Comments
This control provides for the implementation of best practices for endpoint management. Malicious executables can be prevented from running by implementing application control, script blocking, and other execution prevention mechanisms.
|
| UEM-05 | Endpoint Management | mitigates | T1562.001 | Disable or Modify Tools |
Comments
This control provides for the implementation of best practices for endpoint management. Malicious modification or disabling of security tools can be mitigated by implementing application control, script blocking, and other execution prevention mechanisms.
|
| UEM-05 | Endpoint Management | mitigates | T1059 | Command and Scripting Interpreter |
Comments
This control provides for the implementation of best practices for endpoint management. The execution of unauthorized or malicious code on systems through abuse of command and script interpreters can be prevented by implementing application control, script blocking, and other execution prevention mechanisms.
|
| UEM-05 | Endpoint Management | mitigates | T1059.009 | Cloud API |
Comments
This control provides for the implementation of best practices for endpoint management. The execution of unauthorized or malicious code on systems through abuse of command and script interpreters can be prevented by implementing application control, script blocking, and other execution prevention mechanisms.
|
| UEM-05 | Endpoint Management | mitigates | T1080 | Taint Shared Content |
Comments
This control provides for the implementation of best practices for endpoint management. Endpoint exploit protection capabilities can be used to detect, block, and mitigate conditions indicative of exploits to taint content in shared storage locations.
|
| UEM-05 | Endpoint Management | mitigates | T1211 | Exploitation for Defense Evasion |
Comments
This control provides for the implementation of best practices for endpoint management. Endpoint exploit protection capabilities can be used to detect, block, and mitigate conditions indicative of exploits to bypass security features.
|
| UEM-05 | Endpoint Management | mitigates | T1552 | Unsecured Credentials |
Comments
This control provides for the implementation of best practices for endpoint management. Endpoint exploit protection capabilities can be used to detect, block, and mitigate conditions indicative of exploits of public-facing applications.
|
| UEM-05 | Endpoint Management | mitigates | T1562 | Impair Defenses |
Comments
This control provides for the implementation of best practices for endpoint management. Malicious modification of preventative defenses and detection capabilities can be mitigated by implementing application control, script blocking, and other execution prevention mechanisms.
|
| UEM-05 | Endpoint Management | mitigates | T1490 | Inhibit System Recovery |
Comments
This control provides for the implementation of best practices for endpoint management. Proper security configurations, limited system access, and application control can help mitigate the risk of adversaries deleting or removing built-in data and turning off services designed to aid in the recovery of a corrupted system.
|
| UEM-05 | Endpoint Management | mitigates | T1136 | Create Account |
Comments
This control provides for the implementation of best practices for endpoint management. Proper security configurations and limited system access can help prevent adversaries from creating accounts to maintain access.
|
| UEM-05 | Endpoint Management | mitigates | T1098 | Account Manipulation |
Comments
This control provides for the implementation of best practices for endpoint management. Proper security configurations and limited system access can help prevent adversaries from manipulating accounts to maintain and/or elevate access.
|
| UEM-05 | Endpoint Management | mitigates | T1087 | Account Discovery |
Comments
This control provides for the implementation of best practices for endpoint management. Adjusting access to user lists can prevent abuse of system functionality and help prevent adversaries from getting a listing of valid accounts or usernames.
|
| UEM-05 | Endpoint Management | mitigates | T1548 | Abuse Elevation Control Mechanism |
Comments
This control provides for the implementation of best practices for endpoint management. Adjusting system settings and hardening default configurations can mitigate adversary exploitation of elevation control mechanisms and prevent abuse of system functionality.
|
| UEM-05 | Endpoint Management | mitigates | T1550.004 | Web Session Cookie |
Comments
This control provides for the implementation of best practices for endpoint management. Configuring applications to delete persistent web cookies to help mitigate the risk of adversaries using stolen session cookies.
|
| UEM-05 | Endpoint Management | mitigates | T1535 | Unused/Unsupported Cloud Regions |
Comments
This control provides for the implementation of best practices for endpoint management. Cloud service providers may allow customers to deactivate unused regions to help mitigate the risk of adversaries creating resources in unused regions.
|
| UEM-05 | Endpoint Management | mitigates | T1537 | Transfer Data to Cloud Account |
Comments
This control provides for the implementation of best practices for endpoint management. Configuring appropriate data sharing restrictions in cloud services can help mitigate the risk of adversaries exfiltrating data by transferring.
|
| UEM-05 | Endpoint Management | mitigates | T1666 | Modify Cloud Resource Hierarchy |
Comments
This control provides for the implementation of best practices for endpoint management. Securing resource groups and limiting permissions can help mitigate the risk of adversaries adding, deleting, or otherwise modifying hierarchical structures.
|
| UEM-05 | Endpoint Management | mitigates | T1562 | Impair Defenses |
Comments
This control provides for the implementation of best practices for endpoint management. Preventing insecure connections and ensuring proper permissions can help mitigate the risk of adversaries hindering or disabling preventative defenses.
|
| UEM-05 | Endpoint Management | mitigates | T1606.001 | Web Cookies |
Comments
This control provides for the implementation of best practices for endpoint management. Configuring applications to delete persistent web credentials and limiting privileges can help mitigate the risk of adversaries generating and using forged web cookies.
|
| UEM-05 | Endpoint Management | mitigates | T1213.004 | Customer Relationship Management Software |
Comments
This control provides for the implementation of best practices for endpoint management. Effectively securing information repositories and enforcing robust data retention policies can mitigate the risk of adversaries exploiting information repositories to access sensitive or valuable information.
|
| UEM-05 | Endpoint Management | mitigates | T1606 | Forge Web Credentials |
Comments
This control provides for the implementation of best practices for endpoint management. Configuring applications to delete persistent web credentials and limiting privileges can help mitigate the risk of adversaries generating and using forged web credentials.
|
| UEM-05 | Endpoint Management | mitigates | T1213 | Data from Information Repositories |
Comments
This control provides for the implementation of best practices for endpoint management. Effectively securing information repositories and enforcing robust data retention policies can mitigate the risk of adversaries exploiting information repositories to access sensitive or valuable information.
|
| UEM-10 | Software Firewall | mitigates | T1590.002 | DNS |
Comments
This control describes how CSPs and CSCs must install, update, and properly configure endpoint and software-defined firewalls, regularly review and approve firewall rule changes, and monitor traffic for anomalies and malicious code. These mitigative actions help prevent unauthorized access, block threats, and ensure only approved firewall rules are active.
|
| UEM-10 | Software Firewall | mitigates | T1205.002 | Socket Filters |
Comments
This control describes how CSPs and CSCs must install, update, and properly configure endpoint and software-defined firewalls, regularly review and approve firewall rule changes, and monitor traffic for anomalies and malicious code. These mitigative actions help prevent unauthorized access, block threats, and ensure only approved firewall rules are active.
|
| UEM-10 | Software Firewall | mitigates | T1205.001 | Port Knocking |
Comments
This control describes how CSPs and CSCs must install, update, and properly configure endpoint and software-defined firewalls, regularly review and approve firewall rule changes, and monitor traffic for anomalies and malicious code. These mitigative actions help prevent unauthorized access, block threats, and ensure only approved firewall rules are active.
|
| UEM-10 | Software Firewall | mitigates | T1205 | Traffic Signaling |
Comments
This control describes how CSPs and CSCs must install, update, and properly configure endpoint and software-defined firewalls, regularly review and approve firewall rule changes, and monitor traffic for anomalies and malicious code. These mitigative actions help prevent unauthorized access, block threats, and ensure only approved firewall rules are active.
|
| UEM-10 | Software Firewall | mitigates | T1219.002 | Remote Desktop Software |
Comments
This control describes how CSPs and CSCs must install, update, and properly configure endpoint and software-defined firewalls, regularly review and approve firewall rule changes, and monitor traffic for anomalies and malicious code. These mitigative actions help prevent unauthorized access, block threats, and ensure only approved firewall rules are active.
|
| UEM-10 | Software Firewall | mitigates | T1219 | Remote Access Tools |
Comments
This control describes how CSPs and CSCs must install, update, and properly configure endpoint and software-defined firewalls, regularly review and approve firewall rule changes, and monitor traffic for anomalies and malicious code. These mitigative actions help prevent unauthorized access, block threats, and ensure only approved firewall rules are active.
|
| UEM-10 | Software Firewall | mitigates | T1090.003 | Multi-hop Proxy |
Comments
This control describes how CSPs and CSCs must install, update, and properly configure endpoint and software-defined firewalls, regularly review and approve firewall rule changes, and monitor traffic for anomalies and malicious code. These mitigative actions help prevent unauthorized access, block threats, and ensure only approved firewall rules are active.
|
| UEM-10 | Software Firewall | mitigates | T1090 | Proxy |
Comments
This control describes how CSPs and CSCs must install, update, and properly configure endpoint and software-defined firewalls, regularly review and approve firewall rule changes, and monitor traffic for anomalies and malicious code. These mitigative actions help prevent unauthorized access, block threats, and ensure only approved firewall rules are active.
|
| UEM-10 | Software Firewall | mitigates | T1572 | Protocol Tunneling |
Comments
This control describes how CSPs and CSCs must install, update, and properly configure endpoint and software-defined firewalls, regularly review and approve firewall rule changes, and monitor traffic for anomalies and malicious code. These mitigative actions help prevent unauthorized access, block threats, and ensure only approved firewall rules are active.
|
| UEM-10 | Software Firewall | mitigates | T1095 | Non-Application Layer Protocol |
Comments
This control describes how CSPs and CSCs must install, update, and properly configure endpoint and software-defined firewalls, regularly review and approve firewall rule changes, and monitor traffic for anomalies and malicious code. These mitigative actions help prevent unauthorized access, block threats, and ensure only approved firewall rules are active.
|
| UEM-10 | Software Firewall | mitigates | T1071.005 | Publish/Subscribe Protocols |
Comments
This control describes how CSPs and CSCs must install, update, and properly configure endpoint and software-defined firewalls, regularly review and approve firewall rule changes, and monitor traffic for anomalies and malicious code. These mitigative actions help prevent unauthorized access, block threats, and ensure only approved firewall rules are active.
|
| UEM-10 | Software Firewall | mitigates | T1071 | Application Layer Protocol |
Comments
This control describes how CSPs and CSCs must install, update, and properly configure endpoint and software-defined firewalls, regularly review and approve firewall rule changes, and monitor traffic for anomalies and malicious code. These mitigative actions help prevent unauthorized access, block threats, and ensure only approved firewall rules are active.
|
| UEM-10 | Software Firewall | mitigates | T1499 | Endpoint Denial of Service |
Comments
This control describes how CSPs and CSCs must install, update, and properly configure endpoint and software-defined firewalls, regularly review and approve firewall rule changes, and monitor traffic for anomalies and malicious code. These mitigative actions help prevent unauthorized access, block threats, and ensure only approved firewall rules are active.
|
| UEM-10 | Software Firewall | mitigates | T1498 | Network Denial of Service |
Comments
This control describes how CSPs and CSCs must install, update, and properly configure endpoint and software-defined firewalls, regularly review and approve firewall rule changes, and monitor traffic for anomalies and malicious code. These mitigative actions help prevent unauthorized access, block threats, and ensure only approved firewall rules are active.
|
| UEM-10 | Software Firewall | mitigates | T1498.002 | Reflection Amplification |
Comments
This control describes how CSPs and CSCs must install, update, and properly configure endpoint and software-defined firewalls, regularly review and approve firewall rule changes, and monitor traffic for anomalies and malicious code. These mitigative actions help prevent unauthorized access, block threats, and ensure only approved firewall rules are active.
|
| UEM-10 | Software Firewall | mitigates | T1498.001 | Direct Network Flood |
Comments
This control describes how CSPs and CSCs must install, update, and properly configure endpoint and software-defined firewalls, regularly review and approve firewall rule changes, and monitor traffic for anomalies and malicious code. These mitigative actions help prevent unauthorized access, block threats, and ensure only approved firewall rules are active.
|
| UEM-10 | Software Firewall | mitigates | T1499.002 | Service Exhaustion Flood |
Comments
This control describes how CSPs and CSCs must install, update, and properly configure endpoint and software-defined firewalls, regularly review and approve firewall rule changes, and monitor traffic for anomalies and malicious code. These mitigative actions help prevent unauthorized access, block threats, and ensure only approved firewall rules are active.
|
| UEM-10 | Software Firewall | mitigates | T1499.003 | Application Exhaustion Flood |
Comments
This control describes how CSPs and CSCs must install, update, and properly configure endpoint and software-defined firewalls, regularly review and approve firewall rule changes, and monitor traffic for anomalies and malicious code. These mitigative actions help prevent unauthorized access, block threats, and ensure only approved firewall rules are active.
|
| UEM-10 | Software Firewall | mitigates | T1070.007 | Clear Network Connection History and Configurations |
Comments
This control describes how CSPs and CSCs must install, update, and properly configure endpoint and software-defined firewalls, regularly review and approve firewall rule changes, and monitor traffic for anomalies and malicious code. These mitigative actions help prevent unauthorized access, block threats, and ensure only approved firewall rules are active.
|
| UEM-10 | Software Firewall | mitigates | T1070 | Indicator Removal |
Comments
This control describes how CSPs and CSCs must install, update, and properly configure endpoint and software-defined firewalls, regularly review and approve firewall rule changes, and monitor traffic for anomalies and malicious code. These mitigative actions help prevent unauthorized access, block threats, and ensure only approved firewall rules are active.
|
| UEM-10 | Software Firewall | mitigates | T1562.004 | Disable or Modify System Firewall |
Comments
This control describes how CSPs and CSCs must install, update, and properly configure endpoint and software-defined firewalls, regularly review and approve firewall rule changes, and monitor traffic for anomalies and malicious code. These mitigative actions help prevent unauthorized access, block threats, and ensure only approved firewall rules are active.
|
| UEM-10 | Software Firewall | mitigates | T1562.007 | Disable or Modify Cloud Firewall |
Comments
This control describes how CSPs and CSCs must install, update, and properly configure endpoint and software-defined firewalls, regularly review and approve firewall rule changes, and monitor traffic for anomalies and malicious code. These mitigative actions help prevent unauthorized access, block threats, and ensure only approved firewall rules are active.
|
| UEM-10 | Software Firewall | mitigates | T1562 | Impair Defenses |
Comments
This control describes how CSPs and CSCs must install, update, and properly configure endpoint and software-defined firewalls, regularly review and approve firewall rule changes, and monitor traffic for anomalies and malicious code. These mitigative actions help prevent unauthorized access, block threats, and ensure only approved firewall rules are active.
|
| UEM-09 | Anti-Malware Detection and Prevention | mitigates | T1221 | Template Injection |
Comments
This control describes the implementation of endpoint security, including anti-malware software, to mitigate the risk of exploitation by threat actors. The implementation guidance provides several examples of that the technical measures under Anti-Malware should aid with preventing which include:
Scan installed software and system data content to identify and remove unauthorized code/software.
Prohibit the use of installation of unauthorized software.
Restricting on obtaining malicious data and software from external networks.
Endpoint removable media management.
|
| UEM-09 | Anti-Malware Detection and Prevention | mitigates | T1204 | User Execution |
Comments
This control describes the implementation of endpoint security, including anti-malware software, to mitigate the risk of exploitation by threat actors. The implementation guidance provides several examples of that the technical measures under Anti-Malware should aid with preventing which include:
Scan installed software and system data content to identify and remove unauthorized code/software.
Prohibit the use of installation of unauthorized software.
Restricting on obtaining malicious data and software from external networks.
Endpoint removable media management.
|
| UEM-09 | Anti-Malware Detection and Prevention | mitigates | T1543 | Create or Modify System Process |
Comments
This control describes the implementation of endpoint security, including anti-malware software, to mitigate the risk of exploitation by threat actors. The implementation guidance provides several examples of that the technical measures under Anti-Malware should aid with preventing which include:
Scan installed software and system data content to identify and remove unauthorized code/software.
Prohibit the use of installation of unauthorized software.
Restricting on obtaining malicious data and software from external networks.
Endpoint removable media management.
|
| UEM-09 | Anti-Malware Detection and Prevention | mitigates | T1564 | Hide Artifacts |
Comments
This control describes the implementation of endpoint security, including anti-malware software, to mitigate the risk of exploitation by threat actors. The implementation guidance provides several examples of that the technical measures under Anti-Malware should aid with preventing which include:
Scan installed software and system data content to identify and remove unauthorized code/software.
Prohibit the use of installation of unauthorized software.
Restricting on obtaining malicious data and software from external networks.
Endpoint removable media management.
|
| UEM-09 | Anti-Malware Detection and Prevention | mitigates | T1221 | Template Injection |
Comments
This control describes the implementation of endpoint security, including anti-malware software, to mitigate the risk of exploitation by threat actors. The implementation guidance provides several examples of that the technical measures under Anti-Malware should aid with preventing which include:
Scan installed software and system data content to identify and remove unauthorized code/software.
Prohibit the use of installation of unauthorized software.
Restricting on obtaining malicious data and software from external networks.
Endpoint removable media management.
|
| UEM-09 | Anti-Malware Detection and Prevention | mitigates | T1080 | Taint Shared Content |
Comments
This control describes the implementation of endpoint security, including anti-malware software, to mitigate the risk of exploitation by threat actors. The implementation guidance provides several examples of that the technical measures under Anti-Malware should aid with preventing which include:
Scan installed software and system data content to identify and remove unauthorized code/software.
Prohibit the use of installation of unauthorized software.
Restricting on obtaining malicious data and software from external networks.
Endpoint removable media management.
|
| UEM-09 | Anti-Malware Detection and Prevention | mitigates | T1027 | Obfuscated Files or Information |
Comments
This control describes the implementation of endpoint security, including anti-malware software, to mitigate the risk of exploitation by threat actors. The implementation guidance provides several examples of that the technical measures under Anti-Malware should aid with preventing which include:
Scan installed software and system data content to identify and remove unauthorized code/software.
Prohibit the use of installation of unauthorized software.
Restricting on obtaining malicious data and software from external networks.
Endpoint removable media management.
|
| UEM-09 | Anti-Malware Detection and Prevention | mitigates | T1036 | Masquerading |
Comments
This control describes the implementation of endpoint security, including anti-malware software, to mitigate the risk of exploitation by threat actors. The implementation guidance provides several examples of that the technical measures under Anti-Malware should aid with preventing which include:
Scan installed software and system data content to identify and remove unauthorized code/software.
Prohibit the use of installation of unauthorized software.
Restricting on obtaining malicious data and software from external networks.
Endpoint removable media management.
|
| UEM-09 | Anti-Malware Detection and Prevention | mitigates | T1059.006 | Python |
Comments
This control describes the implementation of endpoint security, including anti-malware software, to mitigate the risk of exploitation by threat actors. The implementation guidance provides several examples of that the technical measures under Anti-Malware should aid with preventing which include:
Scan installed software and system data content to identify and remove unauthorized code/software.
Prohibit the use of installation of unauthorized software.
Restricting on obtaining malicious data and software from external networks.
Endpoint removable media management.
|
| UEM-09 | Anti-Malware Detection and Prevention | mitigates | T1059.005 | Visual Basic |
Comments
This control describes the implementation of endpoint security, including anti-malware software, to mitigate the risk of exploitation by threat actors. The implementation guidance provides several examples of that the technical measures under Anti-Malware should aid with preventing which include:
Scan installed software and system data content to identify and remove unauthorized code/software.
Prohibit the use of installation of unauthorized software.
Restricting on obtaining malicious data and software from external networks.
Endpoint removable media management.
|
| UEM-09 | Anti-Malware Detection and Prevention | mitigates | T1059.001 | PowerShell |
Comments
This control describes the implementation of endpoint security, including anti-malware software, to mitigate the risk of exploitation by threat actors. The implementation guidance provides several examples of that the technical measures under Anti-Malware should aid with preventing which include:
Scan installed software and system data content to identify and remove unauthorized code/software.
Prohibit the use of installation of unauthorized software.
Restricting on obtaining malicious data and software from external networks.
Endpoint removable media management.
|
| UEM-09 | Anti-Malware Detection and Prevention | mitigates | T1059 | Command and Scripting Interpreter |
Comments
This control describes the implementation of endpoint security, including anti-malware software, to mitigate the risk of exploitation by threat actors. The implementation guidance provides several examples of that the technical measures under Anti-Malware should aid with preventing which include:
Scan installed software and system data content to identify and remove unauthorized code/software.
Prohibit the use of installation of unauthorized software.
Restricting on obtaining malicious data and software from external networks.
Endpoint removable media management.
|
| UEM-09 | Anti-Malware Detection and Prevention | mitigates | T1092 | Communication Through Removable Media |
Comments
This control describes the implementation of endpoint security, including anti-malware software, to mitigate the risk of exploitation by threat actors. The implementation guidance provides several examples of that the technical measures under Anti-Malware should aid with preventing which include:
Scan installed software and system data content to identify and remove unauthorized code/software.
Prohibit the use of installation of unauthorized software.
Restricting on obtaining malicious data and software from external networks.
Endpoint removable media management.
|
| UEM-09 | Anti-Malware Detection and Prevention | mitigates | T1091 | Replication Through Removable Media |
Comments
This control describes the implementation of endpoint security, including anti-malware software, to mitigate the risk of exploitation by threat actors. The implementation guidance provides several examples of that the technical measures under Anti-Malware should aid with preventing which include:
Scan installed software and system data content to identify and remove unauthorized code/software.
Prohibit the use of installation of unauthorized software.
Restricting on obtaining malicious data and software from external networks.
Endpoint removable media management.
|
| UEM-09 | Anti-Malware Detection and Prevention | mitigates | T1025 | Data from Removable Media |
Comments
This control describes the implementation of endpoint security, including anti-malware software, to mitigate the risk of exploitation by threat actors. The implementation guidance provides several examples of that the technical measures under Anti-Malware should aid with preventing which include:
Scan installed software and system data content to identify and remove unauthorized code/software.
Prohibit the use of installation of unauthorized software.
Restricting on obtaining malicious data and software from external networks.
Endpoint removable media management.
|
| UEM-11 | Data Loss Prevention | mitigates | T1537 | Transfer Data to Cloud Account |
Comments
Adversaries may exfiltrate data by transferring the data, including through sharing/syncing and creating backups of cloud environments, to another cloud account they control on the same service. This control requires implementing data leakage prevention (DLP) capapbiltities on endpoint devices. This includes classifying and inventorying data, protecting sensitive information in transit and at rest, monitoring for unauthorized disclosures, and responding to policy violations.
|
| UEM-11 | Data Loss Prevention | mitigates | T1567.004 | Exfiltration Over Webhook |
Comments
Adversaries may exfiltrate data to a webhook endpoint rather than over their primary command and control channel. This control requires implementing data leakage prevention (DLP) capapbiltities on endpoint devices. This includes classifying and inventorying data, protecting sensitive information in transit and at rest, monitoring for unauthorized disclosures, and responding to policy violations.
|
| UEM-11 | Data Loss Prevention | mitigates | T1567 | Exfiltration Over Web Service |
Comments
This control requires implementing data leakage prevention (DLP) capapbiltities on endpoint devices. This includes classifying and inventorying data, protecting sensitive information in transit and at rest, monitoring for unauthorized disclosures, and responding to policy violations. Adversaries may use an existing, legitimate external Web service to exfiltrate data rather than their primary command and control channel.
|
| UEM-11 | Data Loss Prevention | mitigates | T1052.001 | Exfiltration over USB |
Comments
Adversaries may attempt to exfiltrate data over a USB connected physical device. This control requires implementing data leakage prevention (DLP) capapbiltities on endpoint devices. This includes classifying and inventorying data, protecting sensitive information in transit and at rest, monitoring for unauthorized disclosures, and responding to policy violations.
|
| UEM-11 | Data Loss Prevention | mitigates | T1052 | Exfiltration Over Physical Medium |
Comments
Adversaries may attempt to exfiltrate data via a physical medium, such as a removable drive. This control requires implementing data leakage prevention (DLP) capapbiltities on endpoint devices. This includes classifying and inventorying data, protecting sensitive information in transit and at rest, monitoring for unauthorized disclosures, and responding to policy violations.
|
| UEM-11 | Data Loss Prevention | mitigates | T1041 | Exfiltration Over C2 Channel |
Comments
Adversaries may steal data by exfiltrating it over an existing command and control channel. Stolen data is encoded into the normal communications channel using the same protocol as command and control communications. This control requires implementing data leakage prevention (DLP) capapbiltities on endpoint devices. This includes classifying and inventorying data, protecting sensitive information in transit and at rest, monitoring for unauthorized disclosures, and responding to policy violations.
|
| UEM-11 | Data Loss Prevention | mitigates | T1048.003 | Exfiltration Over Unencrypted Non-C2 Protocol |
Comments
Adversaries may steal data by exfiltrating it over an un-encrypted network protocol other than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server. Adversaries may opt to obfuscate this data, without the use of encryption, within network protocols that are natively unencrypted (such as HTTP, FTP, or DNS). This may include custom or publicly available encoding/compression algorithms (such as base64) as well as embedding data within protocol headers and fields. This control requires implementing data leakage prevention (DLP) capapbiltities on endpoint devices. This includes classifying and inventorying data, protecting sensitive information in transit and at rest, monitoring for unauthorized disclosures, and responding to policy violations.
|
| UEM-11 | Data Loss Prevention | mitigates | T1048.002 | Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
Comments
This control requires implementing data leakage prevention (DLP) capapbiltities on endpoint devices. This includes classifying and inventorying data, protecting sensitive information in transit and at rest, monitoring for unauthorized disclosures, and responding to policy violations. Adversaries may steal data by exfiltrating it over an asymmetrically encrypted network protocol other than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server.
|
| UEM-11 | Data Loss Prevention | mitigates | T1048 | Exfiltration Over Alternative Protocol |
Comments
Adversaries may steal data by exfiltrating it over a different protocol than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server. This control requires implementing data leakage prevention (DLP) capapbiltities on endpoint devices. This includes classifying and inventorying data, protecting sensitive information in transit and at rest, monitoring for unauthorized disclosures, and responding to policy violations.
|
| UEM-11 | Data Loss Prevention | mitigates | T1020 | Automated Exfiltration |
Comments
Adversaries may exfiltrate data, such as sensitive documents, through the use of automated processing after being gathered during Collection. This control requires implementing data leakage prevention (DLP) capapbiltities on endpoint devices. This includes classifying and inventorying data, protecting sensitive information in transit and at rest, monitoring for unauthorized disclosures, and responding to policy violations.
|
| UEM-11 | Data Loss Prevention | mitigates | T1119 | Automated Collection |
Comments
Once established within a system or network, an adversary may use automated techniques for collecting internal data. Methods for performing this technique could include use of a Command and Scripting Interpreter to search for and copy information fitting set criteria such as file type, location, or name at specific time intervals. In cloud-based environments, adversaries may also use cloud APIs, data pipelines, command line interfaces, or extract, transform, and load (ETL) services to automatically collect data. This control requires implementing data leakage prevention (DLP) capapbiltities on endpoint devices. This includes classifying and inventorying data, protecting sensitive information in transit and at rest, monitoring for unauthorized disclosures, and responding to policy violations.
|
| UEM-11 | Data Loss Prevention | mitigates | T1025 | Data from Removable Media |
Comments
Adversaries may search connected removable media on computers they have compromised to find files of interest. Sensitive data can be collected from any removable media (optical disk drive, USB memory, etc.) connected to the compromised system prior to Exfiltration. This control requires implementing data leakage prevention (DLP) capapbiltities on endpoint devices. This includes classifying and inventorying data, protecting sensitive information in transit and at rest, monitoring for unauthorized disclosures, and responding to policy violations.
|
| UEM-11 | Data Loss Prevention | mitigates | T1005 | Data from Local System |
Comments
Adversaries may search local system sources, such as file systems, configuration files, local databases, or virtual machine files, to find files of interest and sensitive data prior to Exfiltration. This control requires implementing data leakage prevention (DLP) capapbiltities on endpoint devices. This includes classifying and inventorying data, protecting sensitive information in transit and at rest, monitoring for unauthorized disclosures, and responding to policy violations.
|
| UEM-08 | Storage Encryption | mitigates | T1550.001 | Application Access Token |
Comments
This control provides for implementation of endpoint storage encryption. Encryption ensures the confidentiality and integrity of data, such as OAuth access tokens used in a cloud-based email service. File encryption across email communications containing sensitive information that may be obtained through access to email services can help prevent adversaries from stealing application access tokens.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1204.003 | Malicious Image |
Comments
This control provides for the implementation of best practices for third-party endpoint management.
Several cloud service providers support content trust models that require container images be signed by trusted sources. Malicious images can be prevented from running by implementing application control, script blocking, and other runtime execution prevention mechanisms from untrusted sources .
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1204 | User Execution |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Malicious executables can be prevented from running by implementing application control, script blocking, and other execution prevention mechanisms.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1562.001 | Disable or Modify Tools |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Malicious modification or disabling of security tools can be mitigated by implementing application control, script blocking, and other execution prevention mechanisms.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1059 | Command and Scripting Interpreter |
Comments
This control provides for the implementation of best practices for third-party endpoint management. The execution of unauthorized or malicious code on systems through abuse of command and script interpreters can be prevented by implementing application control, script blocking, and other execution prevention mechanisms.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1059.009 | Cloud API |
Comments
This control provides for the implementation of best practices for third-party endpoint management. The execution of unauthorized or malicious code on systems through abuse of command and script interpreters can be prevented by implementing application control, script blocking, and other execution prevention mechanisms.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1080 | Taint Shared Content |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Endpoint exploit protection capabilities can be used to detect, block, and mitigate conditions indicative of exploits to taint content in shared storage locations.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1211 | Exploitation for Defense Evasion |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Endpoint exploit protection capabilities can be used to detect, block, and mitigate conditions indicative of exploits to bypass security features.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1552 | Unsecured Credentials |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Endpoint exploit protection capabilities can be used to detect, block, and mitigate conditions indicative of exploits of public-facing applications.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1490 | Inhibit System Recovery |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Proper security configurations, limited system access, and application control can help mitigate the risk of adversaries deleting or removing built-in data and turning off services designed to aid in the recovery of a corrupted system.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1136 | Create Account |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Proper security configurations and limited system access can help prevent adversaries from creating accounts to maintain access.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1098 | Account Manipulation |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Proper security configurations and limited system access can help prevent adversaries from manipulating accounts to maintain and/or elevate access.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1087 | Account Discovery |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Adjusting access to user lists can prevent abuse of system functionality and help prevent adversaries from getting a listing of valid accounts or usernames.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1548 | Abuse Elevation Control Mechanism |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Adjusting system settings and hardening default configurations can mitigate adversary exploitation of elevation control mechanisms and prevent abuse of system functionality.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1550.004 | Web Session Cookie |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Configuring applications to delete persistent web cookies to help mitigate the risk of adversaries using stolen session cookies.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1535 | Unused/Unsupported Cloud Regions |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Cloud service providers may allow customers to deactivate unused regions to help mitigate the risk of adversaries creating resources in unused regions.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1537 | Transfer Data to Cloud Account |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Configuring appropriate data sharing restrictions in cloud services can help mitigate the risk of adversaries exfiltrating data by transferring.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1666 | Modify Cloud Resource Hierarchy |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Securing resource groups and limiting permissions can help mitigate the risk of adversaries adding, deleting, or otherwise modifying hierarchical structures.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1562 | Impair Defenses |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Preventing insecure connections and ensuring proper permissions can help mitigate the risk of adversaries hindering or disabling preventative defenses.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1606.001 | Web Cookies |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Configuring applications to delete persistent web credentials and limiting privileges can help mitigate the risk of adversaries generating and using forged web cookies.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1213.004 | Customer Relationship Management Software |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Effectively securing information repositories and enforcing robust data retention policies can mitigate the risk of adversaries exploiting information repositories to access sensitive or valuable information.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1606 | Forge Web Credentials |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Configuring applications to delete persistent web credentials and limiting privileges can help mitigate the risk of adversaries generating and using forged web credentials.
|
| UEM-14 | Third-Party Endpoint Security Posture | mitigates | T1213 | Data from Information Repositories |
Comments
This control provides for the implementation of best practices for third-party endpoint management. Effectively securing information repositories and enforcing robust data retention policies can mitigate the risk of adversaries exploiting information repositories to access sensitive or valuable information.
|
| Capability ID | Capability Name | Number of Mappings |
|---|---|---|
| UEM-09 | Anti-Malware Detection and Prevention | 15 |
| UEM-14 | Third-Party Endpoint Security Posture | 22 |
| UEM-10 | Software Firewall | 23 |
| UEM-11 | Data Loss Prevention | 13 |
| UEM-08 | Storage Encryption | 9 |
| UEM-05 | Endpoint Management | 22 |