Secure and protect infrastructure

From pre-attack
Jump to: navigation, search


Secure and protect infrastructure
Technique
ID PRE-T1094
Tactic Adversary OPSEC

Definition

An adversary may secure and protect their infrastructure just as defenders do. This could include the use of VPNs, security software, logging and monitoring, passwords, or other defensive measures.1

Difficulty for the Adversary

Easy for the Adversary (Yes/No): Yes

Explanation: Adversary benefits from our own advances, techniques, and software when securing and protecting their own development infrastructure.

Detection

Detectable by Common Defenses (Yes/No/Partial): No

Explanation: Indistinguishable from standard security practices employed by legitimate operators.