Critical Infrastructure Cybersecurity Framework
T1599Defense Evasion3 Mitigations

Network Boundary Bridging

Adversaries may bridge network boundaries by compromising perimeter network devices or internal devices responsible for network segmentation.

Description

Adversaries may bridge network boundaries by compromising perimeter network devices or internal devices responsible for network segmentation.

Available Mitigations

This technique can be mitigated using 3 documented security measures.

Credential Access ProtectionFilter Network TrafficNetwork Segmentation

Quick Info

Technique ID
T1599
Sub-Techniques
1
Mitigations
3

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.