Data from Local System
Adversaries may search local system sources, such as file systems and configuration files or local databases, to find files of interest and sensitive data.
Description
Adversaries may search local system sources, such as file systems and configuration files or local databases, to find files of interest and sensitive data.
Available Mitigations
This technique can be mitigated using 2 documented security measures.
Data Loss PreventionEncrypt Sensitive Information
Quick Info
- Technique ID
- T1005
- Tactic
- Collection
- Mitigations
- 2
