D3FEND Learning Hub
Master defensive countermeasures with the MITRE D3FEND framework. Learn practical techniques to defend against adversary attacks.
The 7 D3FEND Defensive Tactics
D3FEND Matrix
Featured Techniques
Start with these essential defensive techniques, one from each D3FEND tactic.
Asset Inventory
Maintain a comprehensive inventory of hardware, software, and data assets to understand what needs protection and identify unauthorized assets.
Access Control List Hardening
Implement and maintain access control lists to restrict unauthorized access to systems, networks, and data.
Network Traffic Analysis
Monitor and analyze network traffic patterns to identify malicious activity, data exfiltration, and command-and-control communications.
Network Isolation
Segment networks to contain threats and limit lateral movement by restricting communications between zones.
Decoy Token Deployment
Deploy fake credentials, API keys, and tokens that alert when accessed by adversaries.
Credential Rotation
Rotate compromised or potentially compromised credentials to deny adversary access.
Backup and Recovery
Maintain and test backups to enable recovery from ransomware, data loss, and system compromise.