Critical Infrastructure Cybersecurity Framework
T1490Impact2 Mitigations

Inhibit System Recovery

Adversaries may delete or remove built-in operating system data and turn off services designed to aid in the recovery of a corrupted system.

Description

Adversaries may delete or remove built-in operating system data and turn off services designed to aid in the recovery of a corrupted system.

Available Mitigations

This technique can be mitigated using 2 documented security measures.

Data BackupOperating System Configuration

Quick Info

Technique ID
T1490
Tactic
Impact
Mitigations
2

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.