You are on page 1of 1

Defend Mitre

Evict Model

Process Eviction Credential Eviction System Mapping Asset Inventory


Process Suspension Account Locking Data Exchange Mapping Asset Vulnerability Enumeration
Process Termination Authentication Cache Invalidation Service Dependency Mapping Configuration Inventory
Credential Revoking System Dependency Mapping Data Inventory

File Eviction System Vulnerability Assessment Hardware Component Inventory

File Removal Operational Activity Mapping Network Node Inventory

Email Removal Access Modeling Software Inventory

Operational Dependency Mapping Network Mapping


Operational Risk Assessment Logical Link Mapping
Deceive
Organization Mapping Active Logical Link Mapping

Passive Logical Link Mapping


Decoy Object Decoy Environment
Network Traffic Policy Mapping
Decoy File Connected Honeynet
Physical Link Mapping
Decoy Network Resource Integrated Honeynet
Active Physical Link Mapping
Decoy Persona Standalone Honeynet

Decoy Public Release

Decoy Session Token Harden


Decoy User Credential

Platform Hardening Application Hardening


Bootloader Authentication Application Configuration Hardening
Isolate
Disk Encryption Dead Code Elimination

Driver Load Integrity Checking Exception Handler Pointer Validation


Network Isolation Execution Isolation
File Encryption Pointer Authentication
Broadcast Domain Isolation Executable Allowlisting
Local File Permissions Process Segment Execution Prevention
DNS Allowlisting Executable Denylisting
RF Shielding Segment Address Offset Randomization
DNS Denylisting Hardware-based Process Isolation
Software Update Stack Frame Canary Validation
Forward Resolution Domain Denylisting IO Port Restriction
System Configuration Permissions Credential Hardening
Hierarchical Domain Denylisting Kernel-based Process Isolation
TPM Boot Integrity Biometric Authentication
Homoglyph Denylisting Mandatory Access Control
Message Hardening Certificate-based Authentication
Forward Resolution IP Denylisting System Call Filtering
Message Authentication Certificate Pinning
Reverse Resolution IP Denylisting
Message Encryption Credential Rotation
Encrypted Tunnels
Transfer Agent Authentication Credential Transmission Scoping
Network Traffic Filtering
Domain Trust Policy
Inbound Traffic Filtering
Multi-factor Authentication
Outbound Traffic Filtering
One-time Password

Strong Password Policy


@hackinarticles
User Account Permissions

https://github.com/Ignitetechnologies

https://in.linkedin.com/company/hackingarticles Detect

User Behavior Analysis File Analysis


Authentication Event Thresholding Dynamic Analysis

Authorization Event Thresholding Emulated File Analysis

Credential Compromise Scope Analysis File Content Rules

Domain Account Monitoring File Hashing

Job Function Access Pattern Analysis Identifier Analysis


Local Account Monitoring Homoglyph Detection

Resource Access Pattern Analysis Identifier Activity Analysis

Session Duration Analysis Identifier Reputation Analysis

User Data Transfer Analysis Domain Name Reputation Analysis

User Geolocation Logon Pattern Analysis File Hash Reputation Analysis

Web Session Activity Analysis IP Reputation Analysis

Process Analysis URL Reputation Analysis

Database Query String Analysis URL Analysis

File Access Pattern Analysis Message Analysis


Indirect Branch Call Analysis Sender MTA Reputation Analysis

Process Code Segment Verification Sender Reputation Analysis

Process Self-Modification Detection Network Traffic Analysis


Process Spawn Analysis Administrative Network Activity Analysis
Process Lineage Analysis Byte Sequence Emulation
Script Execution Analysis Certificate Analysis
Shadow Stack Comparisons Active Certificate Analysis
System Call Analysis Passive Certificate Analysis

File Creation Analysis Client-server Payload Profiling

Platform Monitoring Connection Attempt Analysis

Firmware Behavior Analysis DNS Traffic Analysis

Firmware Embedded Monitoring Code File Carving

Firmware Verification Inbound Session Volume Analysis

Peripheral Firmware Verification IPC Traffic Analysis

System Firmware Verification Network Traffic Community Deviation

Operating System Monitoring Per Host Download-Upload Ratio Analysis

Endpoint Health Beacon Protocol Metadata Anomaly Detection

Input Device Analysis Relay Pattern Analysis

Memory Boundary Tracking Remote Terminal Session Detection

Scheduled Job Analysis RPC Traffic Analysis

System Daemon Monitoring

System File Analysis

Service Binary Verification

System Init Config Analysis

User Session Init Config Analysis

You might also like