Critical Infrastructure Cybersecurity Framework
T1070Defense Evasion2 Mitigations

Indicator Removal

Adversaries may delete or modify artifacts generated within systems to remove evidence of their presence.

Description

Adversaries may delete or modify artifacts generated within systems to remove evidence of their presence.

Available Mitigations

This technique can be mitigated using 2 documented security measures.

Remote Data StorageRestrict File and Directory Permissions

Quick Info

Technique ID
T1070
Sub-Techniques
10
Mitigations
2

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.