Critical Infrastructure Cybersecurity Framework
T1211Defense Evasion3 Mitigations

Exploitation for Defense Evasion

Adversaries may exploit a system or application vulnerability to bypass security features.

Description

Adversaries may exploit a system or application vulnerability to bypass security features.

Available Mitigations

This technique can be mitigated using 3 documented security measures.

Exploit ProtectionUpdate SoftwareVulnerability Scanning

Quick Info

Technique ID
T1211
Mitigations
3

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.