logo

Database

MITRE ATT&CK®

Last updated: 2023/09/18
logo

MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations and is used as a cybersecurity product and service community. This mitigation describes any guidance or training given to developers of applications to avoid introducing security weaknesses that an adversary may be able to take advantage of.

Control-Requirement Mapping

DefinitionRequirements
M1036. Account use policies
M1049. Antivirus/antimalware
M1048. Application isolation and sandboxing
M1047. Audit
M1040. Behavior prevention on endpoint
M1046. Boot integrity
M1045. Code signing
M1043. Credential access protection
M1057. Data loss prevention
M1041. Encrypt sensitive information
M1039. Environment variable permissions
M1038. Execution prevention
M1037. Filter network traffic
M1035. Limit access to resource over network
M1034. Limit hardware installation
M1033. Limit software installation
M1032. Multi-factor authentication
M1031. Network intrusion prevention
M1030. Network segmentation
M1027. Password policies
M1026. Privileged account management
M1025. Privileged process integrity
M1029. Remote data storage
M1022. Restrict file and directory permissions
M1021. Restrict web-based content
M1020. SSL/TLS inspection
M1051. Update software
M1018. User account management
M1016. Vulnerability scanning
M1015. Active directory configuration
M1013. Application developer guidance
M1042. Disable or remove feature or program
M1028. Operating system configuration
M1056. Pre-compromise
M1044. Restrict library loading
M1024. Restrict registry permissions
M1054. Software configuration
M1052. User account control