Network Boundary Bridging
Adversaries may bridge network boundaries by compromising perimeter network devices or internal devices responsible for network segmentation.
Description
Adversaries may bridge network boundaries by compromising perimeter network devices or internal devices responsible for network segmentation.
Available Mitigations
This technique can be mitigated using 3 documented security measures.
Credential Access ProtectionFilter Network TrafficNetwork Segmentation
Quick Info
- Technique ID
- T1599
- Tactic
- Defense Evasion
- Sub-Techniques
- 1
- Mitigations
- 3
