Critical Infrastructure Cybersecurity Framework
T1210Lateral Move5 Mitigations

Exploitation of Remote Services

Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.

Description

Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.

Available Mitigations

This technique can be mitigated using 5 documented security measures.

Exploit ProtectionLimit Access to Resource Over NetworkNetwork SegmentationUpdate SoftwareVulnerability Scanning

Quick Info

Technique ID
T1210
Mitigations
5

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.