Critical Infrastructure Cybersecurity Framework
T1005Collection2 Mitigations

Data from Local System

Adversaries may search local system sources, such as file systems and configuration files or local databases, to find files of interest and sensitive data.

Description

Adversaries may search local system sources, such as file systems and configuration files or local databases, to find files of interest and sensitive data.

Available Mitigations

This technique can be mitigated using 2 documented security measures.

Data Loss PreventionEncrypt Sensitive Information

Quick Info

Technique ID
T1005
Mitigations
2

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.