Barriers Library

Reusable barriers — prevention barriers sit on threat paths, mitigation barriers on consequence paths.

Add Barrier

Tags:
189 barriers — page 2 of 4
Name Type Category Tags Description
Restrict File and Directory Permissions prevention MITRE Mitigation Restricting file and directory permissions involves setting access controls at the file system level… Edit
Restrict Library Loading prevention MITRE Mitigation Restricting library loading involves implementing security controls to ensure that only trusted and … Edit
Restrict Registry Permissions prevention MITRE Mitigation Restricting registry permissions involves configuring access control settings for sensitive registry… Edit
Restrict Web-Based Content prevention MITRE Mitigation Restricting web-based content involves enforcing policies and technologies that limit access to pote… Edit
SSL/TLS Inspection prevention MITRE Mitigation SSL/TLS inspection involves decrypting encrypted network traffic to examine its content for signs of… Edit
Software Configuration prevention MITRE Mitigation Software configuration refers to making security-focused adjustments to the settings of applications… Edit
Threat Intelligence Program prevention MITRE Mitigation A Threat Intelligence Program enables organizations to proactively identify, analyze, and act on cyb… Edit
Update Software prevention MITRE Mitigation Software updates ensure systems are protected against known vulnerabilities by applying patches and … Edit
User Account Control prevention MITRE Mitigation User Account Control (UAC) is a security feature in Microsoft Windows that prevents unauthorized cha… Edit
User Account Management prevention MITRE Mitigation User Account Management involves implementing and enforcing policies for the lifecycle of user accou… Edit
User Training prevention MITRE Mitigation User Training involves educating employees and contractors on recognizing, reporting, and preventing… Edit
Vulnerability Scanning prevention MITRE Mitigation Vulnerability scanning involves the automated or manual assessment of systems, applications, and net… Edit
Network Segmentation of ERP Environment prevention Network Security ERP servers isolated in a dedicated VLAN with strict firewall rules; no direct internet exposure Edit
5.1 – Policies for Information Security prevention Organizational Define, approve, publish, and communicate a set of information security policies. Policies shall ref… Edit
5.10 – Acceptable Use of Information and Other Associated Assets prevention Organizational Identify, document, and implement rules for the acceptable use of information and assets associated … Edit
5.11 – Return of Assets prevention Organizational All personnel and external party users shall return all organisational assets in their possession up… Edit
5.12 – Classification of Information prevention Organizational Classify information according to the organisation's defined classification scheme based on confiden… Edit
5.13 – Labelling of Information prevention Organizational Develop and implement a set of procedures for information labelling in accordance with the classific… Edit
5.14 – Information Transfer prevention Organizational Implement policies, procedures, and controls to protect the transfer of information through all type… Edit
5.15 – Access Control prevention Organizational Establish, document, and review access control rules based on business and information security requ… Edit
5.16 – Identity Management prevention Organizational Manage the full lifecycle of digital identities, including allocation, maintenance, and revocation. … Edit
5.17 – Authentication Information prevention Organizational Manage authentication information — including passwords, keys, tokens, and certificates — securely t… Edit
5.18 – Access Rights prevention Organizational Provision, review, modify, and revoke access rights through a formal process that includes authorisa… Edit
5.19 – Information Security in Supplier Relationships prevention Organizational Define and implement processes and procedures to manage the information security risks associated wi… Edit
5.2 – Information Security Roles and Responsibilities prevention Organizational Define and allocate information security responsibilities in accordance with the security policy. Re… Edit
5.20 – Addressing Information Security Within Supplier Agreements prevention Organizational Establish and agree relevant information security requirements with suppliers based on the type of s… Edit
5.21 – Managing Information Security in the ICT Supply Chain prevention Organizational Define and implement processes and procedures to manage information security risks associated with t… Edit
5.22 – Monitoring, Review and Change Management of Supplier Services prevention Organizational Regularly monitor, review, and audit supplier service delivery. Changes to supplier agreements or se… Edit
5.23 – Information Security for Use of Cloud Services prevention Organizational Establish processes for the acquisition, use, management, and exit from cloud services in accordance… Edit
5.24 – Information Security Incident Management Planning and Preparation mitigation Organizational Plan and prepare for information security incident management by defining processes, roles, and resp… Edit
5.25 – Assessment and Decision on Information Security Events mitigation Organizational Assess information security events against defined criteria and decide whether they are to be classi… Edit
5.26 – Response to Information Security Incidents mitigation Organizational Respond to information security incidents in accordance with documented procedures. Responses shall … Edit
5.27 – Learning from Information Security Incidents mitigation Organizational Use knowledge gained from analysing and resolving information security incidents to reduce the likel… Edit
5.28 – Collection of Evidence mitigation Organizational Define and apply procedures for the identification, collection, acquisition, and preservation of evi… Edit
5.29 – Information Security During Disruption mitigation Organizational Plan how to maintain information security at an appropriate level during disruption. Security contro… Edit
5.3 – Segregation of Duties prevention Organizational Conflicting duties and areas of responsibility shall be segregated to reduce opportunities for unaut… Edit
5.30 – ICT Readiness for Business Continuity mitigation Organizational Plan, implement, maintain, and test ICT readiness to ensure the availability of information systems … Edit
5.31 – Legal, Statutory, Regulatory and Contractual Requirements prevention Organizational Identify, document, and keep current all legal, statutory, regulatory, and contractual requirements … Edit
5.32 – Intellectual Property Rights prevention Organizational Implement appropriate procedures to ensure compliance with legislative, regulatory, and contractual … Edit
5.33 – Protection of Records prevention Organizational Protect records from loss, destruction, falsification, and unauthorised access or release in accorda… Edit
5.34 – Privacy and Protection of Personally Identifiable Information prevention Organizational Identify and meet requirements for the preservation of privacy and protection of personally identifi… Edit
5.35 – Independent Review of Information Security prevention Organizational Conduct independent reviews of the organisation's approach to managing information security and its … Edit
5.36 – Compliance with Policies, Rules and Standards for Information Security prevention Organizational Managers shall regularly review compliance of information processing and procedures within their are… Edit
5.37 – Documented Operating Procedures prevention Organizational Maintain and make available to all users who need them documented operating procedures for all activ… Edit
5.4 – Management Responsibilities prevention Organizational Management shall require all personnel to apply information security in accordance with established … Edit
5.5 – Contact with Authorities mitigation Organizational Maintain appropriate contacts with relevant authorities such as law enforcement, regulatory bodies, … Edit
5.6 – Contact with Special Interest Groups prevention Organizational Maintain contacts with special interest groups, specialist security forums, and professional associa… Edit
5.7 – Threat Intelligence prevention Organizational Collect, analyse, and produce threat intelligence regarding information security threats to inform r… Edit
5.8 – Information Security in Project Management prevention Organizational Integrate information security into project management, regardless of the type of project. Security … Edit
6.1 – Screening prevention People Carry out background verification checks on all candidates for employment in accordance with applica… Edit

189 total