test_scratch / cti-ATT-CK-v13.1 /enterprise-attack /relationship /relationship--004fbe29-2537-418e-9951-a2750a5fa901.json
khoicrtp's picture
Upload 2298 files
5fe70fd
raw
history blame
1.21 kB
{
"type": "bundle",
"id": "bundle--ddb8fa70-f6ec-4cc1-acab-8f12aca1bb17",
"spec_version": "2.0",
"objects": [
{
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"id": "relationship--004fbe29-2537-418e-9951-a2750a5fa901",
"type": "relationship",
"created": "2020-10-20T03:11:14.529Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"modified": "2021-04-15T03:19:01.263Z",
"description": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.",
"relationship_type": "mitigates",
"source_ref": "course-of-action--78bb71be-92b4-46de-acd6-5f998fedf1cc",
"target_ref": "attack-pattern--67073dde-d720-45ae-83da-b12d5e73ca3b",
"x_mitre_version": "1.0",
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5"
}
]
}