Barriers Library
Reusable barriers — prevention barriers sit on threat paths, mitigation barriers on consequence paths.
Add Barrier
Tags:
189 barriers — page 2 of 4
| Name | Type | Category | Tags | Description | |
|---|---|---|---|---|---|
| Restrict File and Directory Permissions | prevention | MITRE Mitigation | Restricting file and directory permissions involves setting access controls at the file system level… | Edit | |
| Restrict Library Loading | prevention | MITRE Mitigation | Restricting library loading involves implementing security controls to ensure that only trusted and … | Edit | |
| Restrict Registry Permissions | prevention | MITRE Mitigation | Restricting registry permissions involves configuring access control settings for sensitive registry… | Edit | |
| Restrict Web-Based Content | prevention | MITRE Mitigation | Restricting web-based content involves enforcing policies and technologies that limit access to pote… | Edit | |
| SSL/TLS Inspection | prevention | MITRE Mitigation | SSL/TLS inspection involves decrypting encrypted network traffic to examine its content for signs of… | Edit | |
| Software Configuration | prevention | MITRE Mitigation | Software configuration refers to making security-focused adjustments to the settings of applications… | Edit | |
| Threat Intelligence Program | prevention | MITRE Mitigation | A Threat Intelligence Program enables organizations to proactively identify, analyze, and act on cyb… | Edit | |
| Update Software | prevention | MITRE Mitigation | Software updates ensure systems are protected against known vulnerabilities by applying patches and … | Edit | |
| User Account Control | prevention | MITRE Mitigation | User Account Control (UAC) is a security feature in Microsoft Windows that prevents unauthorized cha… | Edit | |
| User Account Management | prevention | MITRE Mitigation | User Account Management involves implementing and enforcing policies for the lifecycle of user accou… | Edit | |
| User Training | prevention | MITRE Mitigation | User Training involves educating employees and contractors on recognizing, reporting, and preventing… | Edit | |
| Vulnerability Scanning | prevention | MITRE Mitigation | Vulnerability scanning involves the automated or manual assessment of systems, applications, and net… | Edit | |
| Network Segmentation of ERP Environment | prevention | Network Security | ERP servers isolated in a dedicated VLAN with strict firewall rules; no direct internet exposure | Edit | |
| 5.1 – Policies for Information Security | prevention | Organizational | Define, approve, publish, and communicate a set of information security policies. Policies shall ref… | Edit | |
| 5.10 – Acceptable Use of Information and Other Associated Assets | prevention | Organizational | Identify, document, and implement rules for the acceptable use of information and assets associated … | Edit | |
| 5.11 – Return of Assets | prevention | Organizational | All personnel and external party users shall return all organisational assets in their possession up… | Edit | |
| 5.12 – Classification of Information | prevention | Organizational | Classify information according to the organisation's defined classification scheme based on confiden… | Edit | |
| 5.13 – Labelling of Information | prevention | Organizational | Develop and implement a set of procedures for information labelling in accordance with the classific… | Edit | |
| 5.14 – Information Transfer | prevention | Organizational | Implement policies, procedures, and controls to protect the transfer of information through all type… | Edit | |
| 5.15 – Access Control | prevention | Organizational | Establish, document, and review access control rules based on business and information security requ… | Edit | |
| 5.16 – Identity Management | prevention | Organizational | Manage the full lifecycle of digital identities, including allocation, maintenance, and revocation. … | Edit | |
| 5.17 – Authentication Information | prevention | Organizational | Manage authentication information — including passwords, keys, tokens, and certificates — securely t… | Edit | |
| 5.18 – Access Rights | prevention | Organizational | Provision, review, modify, and revoke access rights through a formal process that includes authorisa… | Edit | |
| 5.19 – Information Security in Supplier Relationships | prevention | Organizational | Define and implement processes and procedures to manage the information security risks associated wi… | Edit | |
| 5.2 – Information Security Roles and Responsibilities | prevention | Organizational | Define and allocate information security responsibilities in accordance with the security policy. Re… | Edit | |
| 5.20 – Addressing Information Security Within Supplier Agreements | prevention | Organizational | Establish and agree relevant information security requirements with suppliers based on the type of s… | Edit | |
| 5.21 – Managing Information Security in the ICT Supply Chain | prevention | Organizational | Define and implement processes and procedures to manage information security risks associated with t… | Edit | |
| 5.22 – Monitoring, Review and Change Management of Supplier Services | prevention | Organizational | Regularly monitor, review, and audit supplier service delivery. Changes to supplier agreements or se… | Edit | |
| 5.23 – Information Security for Use of Cloud Services | prevention | Organizational | Establish processes for the acquisition, use, management, and exit from cloud services in accordance… | Edit | |
| 5.24 – Information Security Incident Management Planning and Preparation | mitigation | Organizational | Plan and prepare for information security incident management by defining processes, roles, and resp… | Edit | |
| 5.25 – Assessment and Decision on Information Security Events | mitigation | Organizational | Assess information security events against defined criteria and decide whether they are to be classi… | Edit | |
| 5.26 – Response to Information Security Incidents | mitigation | Organizational | Respond to information security incidents in accordance with documented procedures. Responses shall … | Edit | |
| 5.27 – Learning from Information Security Incidents | mitigation | Organizational | Use knowledge gained from analysing and resolving information security incidents to reduce the likel… | Edit | |
| 5.28 – Collection of Evidence | mitigation | Organizational | Define and apply procedures for the identification, collection, acquisition, and preservation of evi… | Edit | |
| 5.29 – Information Security During Disruption | mitigation | Organizational | Plan how to maintain information security at an appropriate level during disruption. Security contro… | Edit | |
| 5.3 – Segregation of Duties | prevention | Organizational | Conflicting duties and areas of responsibility shall be segregated to reduce opportunities for unaut… | Edit | |
| 5.30 – ICT Readiness for Business Continuity | mitigation | Organizational | Plan, implement, maintain, and test ICT readiness to ensure the availability of information systems … | Edit | |
| 5.31 – Legal, Statutory, Regulatory and Contractual Requirements | prevention | Organizational | Identify, document, and keep current all legal, statutory, regulatory, and contractual requirements … | Edit | |
| 5.32 – Intellectual Property Rights | prevention | Organizational | Implement appropriate procedures to ensure compliance with legislative, regulatory, and contractual … | Edit | |
| 5.33 – Protection of Records | prevention | Organizational | Protect records from loss, destruction, falsification, and unauthorised access or release in accorda… | Edit | |
| 5.34 – Privacy and Protection of Personally Identifiable Information | prevention | Organizational | Identify and meet requirements for the preservation of privacy and protection of personally identifi… | Edit | |
| 5.35 – Independent Review of Information Security | prevention | Organizational | Conduct independent reviews of the organisation's approach to managing information security and its … | Edit | |
| 5.36 – Compliance with Policies, Rules and Standards for Information Security | prevention | Organizational | Managers shall regularly review compliance of information processing and procedures within their are… | Edit | |
| 5.37 – Documented Operating Procedures | prevention | Organizational | Maintain and make available to all users who need them documented operating procedures for all activ… | Edit | |
| 5.4 – Management Responsibilities | prevention | Organizational | Management shall require all personnel to apply information security in accordance with established … | Edit | |
| 5.5 – Contact with Authorities | mitigation | Organizational | Maintain appropriate contacts with relevant authorities such as law enforcement, regulatory bodies, … | Edit | |
| 5.6 – Contact with Special Interest Groups | prevention | Organizational | Maintain contacts with special interest groups, specialist security forums, and professional associa… | Edit | |
| 5.7 – Threat Intelligence | prevention | Organizational | Collect, analyse, and produce threat intelligence regarding information security threats to inform r… | Edit | |
| 5.8 – Information Security in Project Management | prevention | Organizational | Integrate information security into project management, regardless of the type of project. Security … | Edit | |
| 6.1 – Screening | prevention | People | Carry out background verification checks on all candidates for employment in accordance with applica… | Edit |