test_scratch / cti-ATT-CK-v13.1 /ics-attack /relationship /relationship--0491ef92-2941-4841-9fe6-2e1809788b52.json
khoicrtp's picture
Upload 2298 files
5fe70fd
raw
history blame
1.49 kB
{
"type": "bundle",
"id": "bundle--3f2a5ccb-49f8-4116-a2de-ddfafc41ac4e",
"spec_version": "2.0",
"objects": [
{
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"type": "relationship",
"id": "relationship--0491ef92-2941-4841-9fe6-2e1809788b52",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"created": "2020-09-21T17:59:24.739Z",
"modified": "2022-05-06T17:47:24.210Z",
"relationship_type": "mitigates",
"description": "Perform audits or scans of systems, permissions, insecure software, insecure configurations, etc. to identify potential weaknesses. Perform periodic integrity checks of the device to validate the correctness of the firmware, software, programs, and configurations. Integrity checks, which typically include cryptographic hashes or digital signatures, should be compared to those obtained at known valid states, especially after events like device reboots, program downloads, or program restarts.\n",
"source_ref": "course-of-action--bcf91ebc-f316-4e19-b2f6-444e9940c697",
"target_ref": "attack-pattern--5e0f75da-e108-4688-a6de-a4f07cc2cbe3",
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"x_mitre_version": "1.0"
}
]
}