Barriers Library
Reusable barriers — prevention barriers sit on threat paths, mitigation barriers on consequence paths.
Add Barrier
Tags:
clear tags
44 barriers — page 1 of 1
| Name | Type | Category | Tags | Description | |
|---|---|---|---|---|---|
| Account Use Policies | prevention | MITRE Mitigation | Account Use Policies help mitigate unauthorized access by configuring and enforcing rules that gover… | Edit | |
| Active Directory Configuration | prevention | MITRE Mitigation | Implement robust Active Directory (AD) configurations using group policies to secure user accounts, … | Edit | |
| Antivirus/Antimalware | prevention | MITRE Mitigation | Antivirus/Antimalware solutions utilize signatures, heuristics, and behavioral analysis to detect, b… | Edit | |
| Application Developer Guidance | prevention | MITRE Mitigation | Application Developer Guidance focuses on providing developers with the knowledge, tools, and best p… | Edit | |
| Application Isolation and Sandboxing | prevention | MITRE Mitigation | Application Isolation and Sandboxing refers to the technique of restricting the execution of code to… | Edit | |
| Audit | prevention | MITRE Mitigation | Auditing is the process of recording activity and systematically reviewing and analyzing the activit… | Edit | |
| Behavior Prevention on Endpoint | prevention | MITRE Mitigation | Behavior Prevention on Endpoint refers to the use of technologies and strategies to detect and block… | Edit | |
| Boot Integrity | prevention | MITRE Mitigation | Boot Integrity ensures that a system starts securely by verifying the integrity of its boot process,… | Edit | |
| Code Signing | prevention | MITRE Mitigation | Code Signing is a security process that ensures the authenticity and integrity of software by digita… | Edit | |
| Credential Access Protection | prevention | MITRE Mitigation | Credential Access Protection focuses on implementing measures to prevent adversaries from obtaining … | Edit | |
| Data Backup | prevention | MITRE Mitigation | Data Backup involves taking and securely storing backups of data from end-user systems and critical … | Edit | |
| Data Loss Prevention | prevention | MITRE Mitigation | Data Loss Prevention (DLP) involves implementing strategies and technologies to identify, categorize… | Edit | |
| Disable or Remove Feature or Program | prevention | MITRE Mitigation | Disable or remove unnecessary and potentially vulnerable software, features, or services to reduce t… | Edit | |
| Do Not Mitigate | prevention | MITRE Mitigation | The Do Not Mitigate category highlights scenarios where attempting to mitigate a specific technique … | Edit | |
| Encrypt Sensitive Information | prevention | MITRE Mitigation | Protect sensitive information at rest, in transit, and during processing by using strong encryption … | Edit | |
| Environment Variable Permissions | prevention | MITRE Mitigation | Restrict the modification of environment variables to authorized users and processes by enforcing st… | Edit | |
| Execution Prevention | prevention | MITRE Mitigation | Prevent the execution of unauthorized or malicious code on systems by implementing application contr… | Edit | |
| Exploit Protection | prevention | MITRE Mitigation | Deploy capabilities that detect, block, and mitigate conditions indicative of software exploits. The… | Edit | |
| Filter Network Traffic | prevention | MITRE Mitigation | Employ network appliances and endpoint software to filter ingress, egress, and lateral network traff… | Edit | |
| Limit Access to Resource Over Network | prevention | MITRE Mitigation | Restrict access to network resources, such as file shares, remote systems, and services, to only tho… | Edit | |
| Limit Hardware Installation | prevention | MITRE Mitigation | Prevent unauthorized users or groups from installing or using hardware, such as external drives, per… | Edit | |
| Limit Software Installation | prevention | MITRE Mitigation | Prevent users or groups from installing unauthorized or unapproved software to reduce the risk of in… | Edit | |
| Multi-factor Authentication | prevention | MITRE Mitigation | Multi-Factor Authentication (MFA) enhances security by requiring users to provide at least two forms… | Edit | |
| Network Intrusion Prevention | prevention | MITRE Mitigation | Use intrusion detection signatures to block traffic at network boundaries. | Edit | |
| Network Segmentation | prevention | MITRE Mitigation | Network segmentation involves dividing a network into smaller, isolated segments to control and limi… | Edit | |
| Operating System Configuration | prevention | MITRE Mitigation | Operating System Configuration involves adjusting system settings and hardening the default configur… | Edit | |
| Out-of-Band Communications Channel | prevention | MITRE Mitigation | Establish secure out-of-band communication channels to ensure the continuity of critical communicati… | Edit | |
| Password Policies | prevention | MITRE Mitigation | Set and enforce secure password policies for accounts to reduce the likelihood of unauthorized acces… | Edit | |
| Pre-compromise | prevention | MITRE Mitigation | Pre-compromise mitigations involve proactive measures and defenses implemented to prevent adversarie… | Edit | |
| Privileged Account Management | prevention | MITRE Mitigation | Privileged Account Management focuses on implementing policies, controls, and tools to securely mana… | Edit | |
| Privileged Process Integrity | prevention | MITRE Mitigation | Privileged Process Integrity focuses on defending highly privileged processes (e.g., system services… | Edit | |
| Remote Data Storage | prevention | MITRE Mitigation | Remote Data Storage focuses on moving critical data, such as security logs and sensitive files, to s… | Edit | |
| Restrict File and Directory Permissions | prevention | MITRE Mitigation | Restricting file and directory permissions involves setting access controls at the file system level… | Edit | |
| Restrict Library Loading | prevention | MITRE Mitigation | Restricting library loading involves implementing security controls to ensure that only trusted and … | Edit | |
| Restrict Registry Permissions | prevention | MITRE Mitigation | Restricting registry permissions involves configuring access control settings for sensitive registry… | Edit | |
| Restrict Web-Based Content | prevention | MITRE Mitigation | Restricting web-based content involves enforcing policies and technologies that limit access to pote… | Edit | |
| SSL/TLS Inspection | prevention | MITRE Mitigation | SSL/TLS inspection involves decrypting encrypted network traffic to examine its content for signs of… | Edit | |
| Software Configuration | prevention | MITRE Mitigation | Software configuration refers to making security-focused adjustments to the settings of applications… | Edit | |
| Threat Intelligence Program | prevention | MITRE Mitigation | A Threat Intelligence Program enables organizations to proactively identify, analyze, and act on cyb… | Edit | |
| Update Software | prevention | MITRE Mitigation | Software updates ensure systems are protected against known vulnerabilities by applying patches and … | Edit | |
| User Account Control | prevention | MITRE Mitigation | User Account Control (UAC) is a security feature in Microsoft Windows that prevents unauthorized cha… | Edit | |
| User Account Management | prevention | MITRE Mitigation | User Account Management involves implementing and enforcing policies for the lifecycle of user accou… | Edit | |
| User Training | prevention | MITRE Mitigation | User Training involves educating employees and contractors on recognizing, reporting, and preventing… | Edit | |
| Vulnerability Scanning | prevention | MITRE Mitigation | Vulnerability scanning involves the automated or manual assessment of systems, applications, and net… | Edit |