Critical Infrastructure Cybersecurity Framework
T1573C21 Mitigations

Encrypted Channel

Adversaries may employ a known encryption algorithm to conceal command and control traffic.

Description

Adversaries may employ a known encryption algorithm to conceal command and control traffic.

Available Mitigations

This technique can be mitigated using 1 documented security measures.

SSL/TLS Inspection

Quick Info

Technique ID
T1573
Tactic
C2
Sub-Techniques
2
Mitigations
1

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.