System entry and exit points include firewalls, remote-access servers, electronic mail servers, web servers, proxy servers, workstations, notebook computers, and mobile devices. Spam can be transported by different means, including email, email attachments, and web accesses. Spam protection mechanisms include signature definitions.
Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name |
---|---|---|---|---|
SI-8 | Spam Protection | Protects | T1204 | User Execution |
SI-8 | Spam Protection | Protects | T1204.001 | Malicious Link |
SI-8 | Spam Protection | Protects | T1204.002 | Malicious File |
SI-8 | Spam Protection | Protects | T1204.003 | Malicious Image |
SI-8 | Spam Protection | Protects | T1221 | Template Injection |
SI-8 | Spam Protection | Protects | T1566 | Phishing |
SI-8 | Spam Protection | Protects | T1566.001 | Spearphishing Attachment |
SI-8 | Spam Protection | Protects | T1566.002 | Spearphishing Link |
SI-8 | Spam Protection | Protects | T1566.003 | Spearphishing via Service |
SI-8 | Spam Protection | Protects | T1598 | Phishing for Information |
SI-8 | Spam Protection | Protects | T1598.001 | Spearphishing Service |
SI-8 | Spam Protection | Protects | T1598.002 | Spearphishing Attachment |
SI-8 | Spam Protection | Protects | T1598.003 | Spearphishing Link |