center-for-threat-informed-defense / security-stack-mappings

🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.
https://center-for-threat-informed-defense.github.io/mappings-explorer/
Apache License 2.0
379 stars 64 forks source link

Update AdvancedProtectionProgram.yaml #172

Closed hashcat3 closed 2 years ago

hashcat3 commented 2 years ago

Unsure if T1601 and T1059 should be mapped here, but if so, MFA can be applied as protection across a breadth of techniques (see https://attack.mitre.org/mitigations/M1032/) that may also need to be considered in this mapping. Just a suggestion.

sonarcloud[bot] commented 2 years ago

Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 0 Code Smells

No Coverage information No Coverage information
No Duplication information No Duplication information

drjohnson87 commented 2 years ago

Both T1601 and T1059 should be removed because these techniques pertain to embedded network systems and harmful downloads per say, rather than focusing specifically on targeting specific users account information