Skip to main content
Cyber Defense TacticsCyber Defense Tactics
HomeLearnResourcesBlogCommunityPricing
Cyber Defense TacticsCyber Defense Tactics

Learn defensive security, leverage AI for cyber defense, and join a community of security professionals.

Learning

  • Blog
  • Resources
  • Newsletter

Community

  • Discord
  • YouTube
  • About

Legal

  • Privacy Policy
  • Terms of Service

© 2026 Cyber Defense Tactics. All rights reserved.

A Carbene.AI Project

Back to D3FEND Hub
D3-ACL

Access Control List Hardening

Harden Tactic
Featured

Implement and maintain access control lists to restrict unauthorized access to systems, networks, and data.

View on MITRE D3FEND

Implementation Guidance

  • Implement least privilege access
  • Regular access reviews and certification
  • Segment networks with ACLs
  • Document and audit ACL changes
  • Automate access provisioning/deprovisioning

Tools & Technologies

Active Directory Group PolicyCisco ACLsAWS Security GroupsAzure NSGsSailPoint IdentityNow

AI Enhancements

  • AI-powered access anomaly detection
  • ML-based privilege optimization recommendations
  • Automated access review prioritization

ATT&CK Techniques Countered

This defensive technique helps protect against the following adversary techniques:

T1021

Remote Services

T1133

External Remote Services

Explore Purple Team Matrix for full mappings

Related Techniques in Harden

D3-CH

Credential Hardening

D3-ASH

Application Security Hardening

D3-OSH

Operating System Hardening

D3-PM

Patch Management

Ready to build a comprehensive defense strategy?