-
Notifications
You must be signed in to change notification settings - Fork 4
/
technique_mitigation_temp.json
1 lines (1 loc) · 8.59 KB
/
technique_mitigation_temp.json
1
[{"_key":"technique_mitigation_00000","_id":"technique_mitigation/technique_mitigation_00000","_rev":"_dVfOFYK---","original_id":"M1013","name":"Application Developer Guidance","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00001","_id":"technique_mitigation/technique_mitigation_00001","_rev":"_dVfOFYK--_","original_id":"M1015","name":"Active Directory Configuration","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00002","_id":"technique_mitigation/technique_mitigation_00002","_rev":"_dVfOFYK--A","original_id":"M1016","name":"Vulnerability Scanning","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00003","_id":"technique_mitigation/technique_mitigation_00003","_rev":"_dVfOFYK--B","original_id":"M1017","name":"User Training","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00004","_id":"technique_mitigation/technique_mitigation_00004","_rev":"_dVfOFYK--C","original_id":"M1018","name":"User Account Management","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00005","_id":"technique_mitigation/technique_mitigation_00005","_rev":"_dVfOFYK--D","original_id":"M1019","name":"Threat Intelligence Program","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00006","_id":"technique_mitigation/technique_mitigation_00006","_rev":"_dVfOFYK--E","original_id":"M1020","name":"SSL/TLS Inspection","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00007","_id":"technique_mitigation/technique_mitigation_00007","_rev":"_dVfOFYK--F","original_id":"M1021","name":"Restrict Web-Based Content","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00008","_id":"technique_mitigation/technique_mitigation_00008","_rev":"_dVfOFYK--G","original_id":"M1022","name":"Restrict File and Directory Permissions","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00009","_id":"technique_mitigation/technique_mitigation_00009","_rev":"_dVfOFYK--H","original_id":"M1024","name":"Restrict Registry Permissions","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00010","_id":"technique_mitigation/technique_mitigation_00010","_rev":"_dVfOFYK--I","original_id":"M1025","name":"Privileged Process Integrity","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00011","_id":"technique_mitigation/technique_mitigation_00011","_rev":"_dVfOFYK--J","original_id":"M1026","name":"Privileged Account Management","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00012","_id":"technique_mitigation/technique_mitigation_00012","_rev":"_dVfOFYO---","original_id":"M1027","name":"Password Policies","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00013","_id":"technique_mitigation/technique_mitigation_00013","_rev":"_dVfOFYO--_","original_id":"M1028","name":"Operating System Configuration","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00014","_id":"technique_mitigation/technique_mitigation_00014","_rev":"_dVfOFYO--A","original_id":"M1029","name":"Remote Data Storage","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00015","_id":"technique_mitigation/technique_mitigation_00015","_rev":"_dVfOFYO--B","original_id":"M1030","name":"Network Segmentation","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00016","_id":"technique_mitigation/technique_mitigation_00016","_rev":"_dVfOFYO--C","original_id":"M1031","name":"Network Intrusion Prevention","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00017","_id":"technique_mitigation/technique_mitigation_00017","_rev":"_dVfOFYO--D","original_id":"M1032","name":"Multi-factor Authentication","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00018","_id":"technique_mitigation/technique_mitigation_00018","_rev":"_dVfOFYO--E","original_id":"M1033","name":"Limit Software Installation","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00019","_id":"technique_mitigation/technique_mitigation_00019","_rev":"_dVfOFYO--F","original_id":"M1034","name":"Limit Hardware Installation","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00020","_id":"technique_mitigation/technique_mitigation_00020","_rev":"_dVfOFYO--G","original_id":"M1035","name":"Limit Access to Resource Over Network","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00021","_id":"technique_mitigation/technique_mitigation_00021","_rev":"_dVfOFYO--H","original_id":"M1036","name":"Account Use Policies","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00022","_id":"technique_mitigation/technique_mitigation_00022","_rev":"_dVfOFYO--I","original_id":"M1037","name":"Filter Network Traffic","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00023","_id":"technique_mitigation/technique_mitigation_00023","_rev":"_dVfOFYO--J","original_id":"M1038","name":"Execution Prevention","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00024","_id":"technique_mitigation/technique_mitigation_00024","_rev":"_dVfOFYO--K","original_id":"M1039","name":"Environment Variable Permissions","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00025","_id":"technique_mitigation/technique_mitigation_00025","_rev":"_dVfOFYO--L","original_id":"M1040","name":"Behavior Prevention on Endpoint","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00026","_id":"technique_mitigation/technique_mitigation_00026","_rev":"_dVfOFYO--M","original_id":"M1041","name":"Encrypt Sensitive Information","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00027","_id":"technique_mitigation/technique_mitigation_00027","_rev":"_dVfOFYO--N","original_id":"M1042","name":"Disable or Remove Feature or Program","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00028","_id":"technique_mitigation/technique_mitigation_00028","_rev":"_dVfOFYO--O","original_id":"M1043","name":"Credential Access Protection","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00029","_id":"technique_mitigation/technique_mitigation_00029","_rev":"_dVfOFYO--P","original_id":"M1044","name":"Restrict Library Loading","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00030","_id":"technique_mitigation/technique_mitigation_00030","_rev":"_dVfOFYO--Q","original_id":"M1045","name":"Code Signing","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00031","_id":"technique_mitigation/technique_mitigation_00031","_rev":"_dVfOFYO--R","original_id":"M1046","name":"Boot Integrity","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00032","_id":"technique_mitigation/technique_mitigation_00032","_rev":"_dVfOFYO--S","original_id":"M1047","name":"Audit","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00033","_id":"technique_mitigation/technique_mitigation_00033","_rev":"_dVfOFYO--T","original_id":"M1048","name":"Application Isolation and Sandboxing","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00034","_id":"technique_mitigation/technique_mitigation_00034","_rev":"_dVfOFYO--U","original_id":"M1049","name":"Antivirus/Antimalware","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00035","_id":"technique_mitigation/technique_mitigation_00035","_rev":"_dVfOFYO--V","original_id":"M1050","name":"Exploit Protection","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00036","_id":"technique_mitigation/technique_mitigation_00036","_rev":"_dVfOFYO--W","original_id":"M1051","name":"Update Software","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00037","_id":"technique_mitigation/technique_mitigation_00037","_rev":"_dVfOFYO--X","original_id":"M1052","name":"User Account Control","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00038","_id":"technique_mitigation/technique_mitigation_00038","_rev":"_dVfOFYO--Y","original_id":"M1053","name":"Data Backup","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00039","_id":"technique_mitigation/technique_mitigation_00039","_rev":"_dVfOFYO--Z","original_id":"M1054","name":"Software Configuration","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00040","_id":"technique_mitigation/technique_mitigation_00040","_rev":"_dVfOFYO--a","original_id":"M1055","name":"Do Not Mitigate","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00041","_id":"technique_mitigation/technique_mitigation_00041","_rev":"_dVfOFYO--b","original_id":"M1056","name":"Pre-compromise","datatype":"technique_mitigation"},{"_key":"technique_mitigation_00042","_id":"technique_mitigation/technique_mitigation_00042","_rev":"_dVfOFYO--c","original_id":"M1057","name":"Data Loss Prevention","datatype":"technique_mitigation"}]