test_scratch / cti-ATT-CK-v13.1 /ics-attack /relationship /relationship--0a5d2136-e1f5-4a54-be64-a558f918bf0d.json
khoicrtp
updated
5ceca98
raw
history blame
1.42 kB
{
"type": "bundle",
"id": "bundle--497f889c-3e1d-474a-b36e-210dd6441374",
"spec_version": "2.0",
"objects": [
{
"type": "relationship",
"id": "relationship--0a5d2136-e1f5-4a54-be64-a558f918bf0d",
"created": "2020-09-21T17:59:24.739Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"revoked": false,
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"modified": "2023-03-08T22:29:20.151Z",
"description": "All field controllers should require users to authenticate for all remote or local management sessions. The authentication mechanisms should also support [Account Use Policies](https://attack.mitre.org/mitigations/M0936), [Password Policies](https://attack.mitre.org/mitigations/M0927), and [User Account Management](https://attack.mitre.org/mitigations/M0918).",
"relationship_type": "mitigates",
"source_ref": "course-of-action--66cfe23e-34b6-4583-b178-ed6a412db2b0",
"target_ref": "attack-pattern--e6c31185-8040-4267-83d3-b217b8a92f07",
"x_mitre_deprecated": false,
"x_mitre_version": "1.0",
"x_mitre_attack_spec_version": "3.1.0",
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5"
}
]
}