Critical Infrastructure Cybersecurity Framework
T1557Cred Access4 Mitigations

Adversary-in-the-Middle

Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle technique.

Description

Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle technique.

Available Mitigations

This technique can be mitigated using 4 documented security measures.

Disable or Remove Feature or ProgramEncrypt Sensitive InformationFilter Network TrafficNetwork Segmentation

Quick Info

Technique ID
T1557
Sub-Techniques
4
Mitigations
4

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.