File size: 1,206 Bytes
5fe70fd
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
{
    "type": "bundle",
    "id": "bundle--ddb8fa70-f6ec-4cc1-acab-8f12aca1bb17",
    "spec_version": "2.0",
    "objects": [
        {
            "object_marking_refs": [
                "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
            ],
            "id": "relationship--004fbe29-2537-418e-9951-a2750a5fa901",
            "type": "relationship",
            "created": "2020-10-20T03:11:14.529Z",
            "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
            "modified": "2021-04-15T03:19:01.263Z",
            "description": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.",
            "relationship_type": "mitigates",
            "source_ref": "course-of-action--78bb71be-92b4-46de-acd6-5f998fedf1cc",
            "target_ref": "attack-pattern--67073dde-d720-45ae-83da-b12d5e73ca3b",
            "x_mitre_version": "1.0",
            "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5"
        }
    ]
}