Back to D3FEND Hub
Featured
Implement and maintain access control lists to restrict unauthorized access to systems, networks, and data.
Implementation Guidance
- Implement least privilege access
- Regular access reviews and certification
- Segment networks with ACLs
- Document and audit ACL changes
- Automate access provisioning/deprovisioning
Tools & Technologies
Active Directory Group PolicyCisco ACLsAWS Security GroupsAzure NSGsSailPoint IdentityNow
AI Enhancements
- AI-powered access anomaly detection
- ML-based privilege optimization recommendations
- Automated access review prioritization
ATT&CK Techniques Countered
This defensive technique helps protect against the following adversary techniques: