Master defensive countermeasures with the MITRE D3FEND framework. Learn practical techniques to defend against adversary attacks.
Start with these essential defensive techniques, one from each D3FEND tactic.
Maintain a comprehensive inventory of hardware, software, and data assets to understand what needs protection and identify unauthorized assets.
Implement and maintain access control lists to restrict unauthorized access to systems, networks, and data.
Monitor and analyze network traffic patterns to identify malicious activity, data exfiltration, and command-and-control communications.
Segment networks to contain threats and limit lateral movement by restricting communications between zones.
Deploy fake credentials, API keys, and tokens that alert when accessed by adversaries.
Rotate compromised or potentially compromised credentials to deny adversary access.
Maintain and test backups to enable recovery from ransomware, data loss, and system compromise.