Pre-compromise

This category refers to any applicable mitigation activities that apply to techniques used by adversaries before gaining Initial Access, such as Reconnaissance and Resource Development techniques.[1]

Techniques Addressed by Mitigation

Domain ID Name Use
Enterprise VT0006 Active Scanning

This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.

.001 Scanning IP Blocks

This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.

.002 Vulnerability Scanning

This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.

References

Attachments

ID
VM0011
Version
1.0

Created: 09 December 2020

Last Modified: 20 December 2020