File size: 1,663 Bytes
5fe70fd
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
{
    "type": "bundle",
    "id": "bundle--a010090d-3f16-4f7e-814c-da8599564967",
    "spec_version": "2.0",
    "objects": [
        {
            "modified": "2023-03-30T20:55:14.263Z",
            "name": "Communication Authenticity",
            "description": "When communicating over an untrusted network, utilize secure network protocols that both authenticate the message sender and can verify its integrity. This can be done either through message authentication codes (MACs) or digital signatures, to detect spoofed network messages and unauthorized connections.",
            "labels": [
                "IEC 62443-3-3:2013 - SR 3.1",
                "IEC 62443-4-2:2019 - CR 3.1",
                "NIST SP 800-53 Rev. 4 - SC-8; SC-23"
            ],
            "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
            "x_mitre_domains": [
                "ics-attack"
            ],
            "x_mitre_version": "1.0",
            "x_mitre_attack_spec_version": "2.1.0",
            "type": "course-of-action",
            "id": "course-of-action--c7257b6e-4159-4771-b1f3-2bb93adaecac",
            "created": "2020-09-11T16:32:21.854Z",
            "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
            "external_references": [
                {
                    "source_name": "mitre-attack",
                    "url": "https://attack.mitre.org/mitigations/M0802",
                    "external_id": "M0802"
                }
            ],
            "object_marking_refs": [
                "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
            ]
        }
    ]
}