Critical Infrastructure Cybersecurity Framework
T1072Execution2 Mitigations

Software Deployment Tools

Adversaries may gain access to and use third-party software suites installed within an enterprise network.

Description

Adversaries may gain access to and use third-party software suites installed within an enterprise network.

Available Mitigations

This technique can be mitigated using 2 documented security measures.

Network SegmentationPrivileged Account Management

Quick Info

Technique ID
T1072
Tactic
Execution
Mitigations
2

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.