System entry and exit points include firewalls, remote-access servers, electronic mail servers, web servers, proxy servers, workstations, notebook computers, and mobile devices. Spam can be transported by different means, including email, email attachments, and web accesses. Spam protection mechanisms include signature definitions.
Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name |
---|---|---|---|---|
SI-08 | Spam Protection | Protects | T1137 | Office Application Startup |
SI-08 | Spam Protection | Protects | T1137.001 | Office Template Macros |
SI-08 | Spam Protection | Protects | T1137.002 | Office Test |
SI-08 | Spam Protection | Protects | T1137.003 | Outlook Forms |
SI-08 | Spam Protection | Protects | T1137.004 | Outlook Home Page |
SI-08 | Spam Protection | Protects | T1137.005 | Outlook Rules |
SI-08 | Spam Protection | Protects | T1137.006 | Add-ins |
SI-08 | Spam Protection | Protects | T1204 | User Execution |
SI-08 | Spam Protection | Protects | T1204.001 | Malicious Link |
SI-08 | Spam Protection | Protects | T1204.002 | Malicious File |