test_scratch / cti-ATT-CK-v13.1 /ics-attack /course-of-action /course-of-action--1cbcceef-3233-4062-aa86-ec91afe39517.json
khoicrtp's picture
Upload 2298 files
5fe70fd
raw
history blame
2.4 kB
{
"type": "bundle",
"id": "bundle--12cb1484-5fe8-4049-b294-7848cdd11c27",
"spec_version": "2.0",
"objects": [
{
"modified": "2023-03-31T19:16:54.636Z",
"name": "Validate Program Inputs",
"description": "Devices and programs designed to interact with control system parameters should validate the format and content of all user inputs and actions to ensure the values are within intended operational ranges. These values should be evaluated and further enforced through the program logic running on the field controller. If a problematic or invalid input is identified, the programs should either utilize a predetermined safe value or enter a known safe state, while also logging or alerting on the event.(Citation: PLCTop20 Mar 2023)",
"labels": [
"NIST SP 800-53 Rev. 4 - SI-10",
"IEC 62443-3-3:2013 - SR 3.5",
"IEC 62443-3-3:2013 - SR 3.6",
"IEC 62443-4-2:2019 - CR 3.5",
"IEC 62443-4-2:2019 - CR 3.6"
],
"x_mitre_deprecated": false,
"x_mitre_domains": [
"ics-attack"
],
"x_mitre_version": "1.0",
"type": "course-of-action",
"id": "course-of-action--1cbcceef-3233-4062-aa86-ec91afe39517",
"created": "2023-03-22T15:49:55.439Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"revoked": false,
"external_references": [
{
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/mitigations/M0818",
"external_id": "M0818"
},
{
"source_name": "PLCTop20 Mar 2023",
"description": "PLC Security, Top 20 Community. (2021, June 15). Secure PLC Coding Practices: Top 20 version 1.0. Retrieved March 22, 2023.",
"url": "https://plc-security.com/content/Top_20_Secure_PLC_Coding_Practices_V1.0.pdf"
}
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5"
}
]
}