MITRE ATT&CK Enterprise Mitigations provide recommendations and strategies to counter adversary tactics and techniques.

Adam Rhys Heaton
2 min readJul 6, 2023

--

Network Segmentation:

  1. Implement network segmentation to restrict lateral movement within the network, making it harder to propagate and reach critical systems.
  2. Separate critical systems and data repositories from the rest of the network, limiting the impact of a potential ransomware infection.

Application Whitelisting:

  1. Enforce application whitelisting policies to allow only authorized and trusted applications to run within the network. This can help prevent the execution of malicious payloads being delivered.

Patching and Vulnerability Management:

  1. Regularly apply patches and updates to software, operating systems, and third-party applications to mitigate known vulnerabilities that may be exploited.
  2. Implement a robust vulnerability management program to identify and remediate vulnerabilities proactively.

Security Awareness Training:

  1. Conduct regular security awareness training for employees to educate them about phishing, social engineering, and other tactics used by attackers. This can help reduce the risk of initial access through phishing emails or compromised RDP connections.

Privileged Account Management:

  1. Implement strong privileged account management practices, including the principle of least privilege, to minimize the potential impact of privilege escalation techniques.
  2. Enable multi-factor authentication (MFA) for privileged accounts to reduce the risk of credential theft and unauthorized access.

Endpoint Protection:

  1. Deploy advanced endpoint protection solutions capable of detecting and preventing ransomware infections. These solutions should have behavior-based detection capabilities to identify suspicious activities associated with TTPs.
  2. Enable tamper protection features in endpoint protection tools to prevent attackers from disabling or evading security controls.

Backup and Recovery:

  1. Maintain frequent and comprehensive backups of critical data, ensuring they are stored offline or in isolated environments. This enables organizations to restore systems and data in the event of an attack.

Incident Response:

  1. Establish an incident response plan that includes clear procedures for containing, investigating, and recovering from a ransomware attack. This will enable a swift and effective response to mitigate the impact of attacks.

Collaboration and Reporting:

  1. Collaborate with industry peers and share threat intelligence to stay informed about the latest TTPs used by adversaries.
  2. Engage with law enforcement agencies and report incidents to assist in investigations and potential takedowns of the attacters infrastructure.

--

--

Adam Rhys Heaton

Cybersecurity expert 🛡️ Penetration testing 🔎 Cyber Threat Intel 🚨 Educating on best practices 📚 Speaker 🗣️ Follow my blog for all things security 🛡️