CIC-ATT&CK

Critical Infrastructure Cybersecurity

Secure Environment
Critical Infrastructure Cybersecurity Framework
T1482Discovery1 Mitigations

Domain Trust Discovery

Adversaries may attempt to gather information on domain trust relationships that may be used to identify lateral movement opportunities.

Description

Adversaries may attempt to gather information on domain trust relationships that may be used to identify lateral movement opportunities.

Available Mitigations

This technique can be mitigated using 1 documented security measures.

Network Segmentation

Quick Info

Technique ID
T1482
Tactic
Discovery
Mitigations
1

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.