Barriers Library

Reusable barriers — prevention barriers sit on threat paths, mitigation barriers on consequence paths.

Add Barrier

Tags: clear tags
Clear all
44 barriers — page 1 of 1
Name Type Category Tags Description
Account Use Policies prevention MITRE Mitigation Account Use Policies help mitigate unauthorized access by configuring and enforcing rules that gover… Edit
Active Directory Configuration prevention MITRE Mitigation Implement robust Active Directory (AD) configurations using group policies to secure user accounts, … Edit
Antivirus/Antimalware prevention MITRE Mitigation Antivirus/Antimalware solutions utilize signatures, heuristics, and behavioral analysis to detect, b… Edit
Application Developer Guidance prevention MITRE Mitigation Application Developer Guidance focuses on providing developers with the knowledge, tools, and best p… Edit
Application Isolation and Sandboxing prevention MITRE Mitigation Application Isolation and Sandboxing refers to the technique of restricting the execution of code to… Edit
Audit prevention MITRE Mitigation Auditing is the process of recording activity and systematically reviewing and analyzing the activit… Edit
Behavior Prevention on Endpoint prevention MITRE Mitigation Behavior Prevention on Endpoint refers to the use of technologies and strategies to detect and block… Edit
Boot Integrity prevention MITRE Mitigation Boot Integrity ensures that a system starts securely by verifying the integrity of its boot process,… Edit
Code Signing prevention MITRE Mitigation Code Signing is a security process that ensures the authenticity and integrity of software by digita… Edit
Credential Access Protection prevention MITRE Mitigation Credential Access Protection focuses on implementing measures to prevent adversaries from obtaining … Edit
Data Backup prevention MITRE Mitigation Data Backup involves taking and securely storing backups of data from end-user systems and critical … Edit
Data Loss Prevention prevention MITRE Mitigation Data Loss Prevention (DLP) involves implementing strategies and technologies to identify, categorize… Edit
Disable or Remove Feature or Program prevention MITRE Mitigation Disable or remove unnecessary and potentially vulnerable software, features, or services to reduce t… Edit
Do Not Mitigate prevention MITRE Mitigation The Do Not Mitigate category highlights scenarios where attempting to mitigate a specific technique … Edit
Encrypt Sensitive Information prevention MITRE Mitigation Protect sensitive information at rest, in transit, and during processing by using strong encryption … Edit
Environment Variable Permissions prevention MITRE Mitigation Restrict the modification of environment variables to authorized users and processes by enforcing st… Edit
Execution Prevention prevention MITRE Mitigation Prevent the execution of unauthorized or malicious code on systems by implementing application contr… Edit
Exploit Protection prevention MITRE Mitigation Deploy capabilities that detect, block, and mitigate conditions indicative of software exploits. The… Edit
Filter Network Traffic prevention MITRE Mitigation Employ network appliances and endpoint software to filter ingress, egress, and lateral network traff… Edit
Limit Access to Resource Over Network prevention MITRE Mitigation Restrict access to network resources, such as file shares, remote systems, and services, to only tho… Edit
Limit Hardware Installation prevention MITRE Mitigation Prevent unauthorized users or groups from installing or using hardware, such as external drives, per… Edit
Limit Software Installation prevention MITRE Mitigation Prevent users or groups from installing unauthorized or unapproved software to reduce the risk of in… Edit
Multi-factor Authentication prevention MITRE Mitigation Multi-Factor Authentication (MFA) enhances security by requiring users to provide at least two forms… Edit
Network Intrusion Prevention prevention MITRE Mitigation Use intrusion detection signatures to block traffic at network boundaries. Edit
Network Segmentation prevention MITRE Mitigation Network segmentation involves dividing a network into smaller, isolated segments to control and limi… Edit
Operating System Configuration prevention MITRE Mitigation Operating System Configuration involves adjusting system settings and hardening the default configur… Edit
Out-of-Band Communications Channel prevention MITRE Mitigation Establish secure out-of-band communication channels to ensure the continuity of critical communicati… Edit
Password Policies prevention MITRE Mitigation Set and enforce secure password policies for accounts to reduce the likelihood of unauthorized acces… Edit
Pre-compromise prevention MITRE Mitigation Pre-compromise mitigations involve proactive measures and defenses implemented to prevent adversarie… Edit
Privileged Account Management prevention MITRE Mitigation Privileged Account Management focuses on implementing policies, controls, and tools to securely mana… Edit
Privileged Process Integrity prevention MITRE Mitigation Privileged Process Integrity focuses on defending highly privileged processes (e.g., system services… Edit
Remote Data Storage prevention MITRE Mitigation Remote Data Storage focuses on moving critical data, such as security logs and sensitive files, to s… Edit
Restrict File and Directory Permissions prevention MITRE Mitigation Restricting file and directory permissions involves setting access controls at the file system level… Edit
Restrict Library Loading prevention MITRE Mitigation Restricting library loading involves implementing security controls to ensure that only trusted and … Edit
Restrict Registry Permissions prevention MITRE Mitigation Restricting registry permissions involves configuring access control settings for sensitive registry… Edit
Restrict Web-Based Content prevention MITRE Mitigation Restricting web-based content involves enforcing policies and technologies that limit access to pote… Edit
SSL/TLS Inspection prevention MITRE Mitigation SSL/TLS inspection involves decrypting encrypted network traffic to examine its content for signs of… Edit
Software Configuration prevention MITRE Mitigation Software configuration refers to making security-focused adjustments to the settings of applications… Edit
Threat Intelligence Program prevention MITRE Mitigation A Threat Intelligence Program enables organizations to proactively identify, analyze, and act on cyb… Edit
Update Software prevention MITRE Mitigation Software updates ensure systems are protected against known vulnerabilities by applying patches and … Edit
User Account Control prevention MITRE Mitigation User Account Control (UAC) is a security feature in Microsoft Windows that prevents unauthorized cha… Edit
User Account Management prevention MITRE Mitigation User Account Management involves implementing and enforcing policies for the lifecycle of user accou… Edit
User Training prevention MITRE Mitigation User Training involves educating employees and contractors on recognizing, reporting, and preventing… Edit
Vulnerability Scanning prevention MITRE Mitigation Vulnerability scanning involves the automated or manual assessment of systems, applications, and net… Edit