test_scratch / cti-ATT-CK-v13.1 /mobile-attack /course-of-action /course-of-action--8ccd428d-39da-4e8f-a55b-d48ea1d56e58.json
khoicrtp's picture
Upload 2298 files
5fe70fd
raw
history blame
1.31 kB
{
"type": "bundle",
"id": "bundle--176bd630-6879-437d-9700-820ec6aa9711",
"spec_version": "2.0",
"objects": [
{
"x_mitre_domains": [
"mobile-attack"
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"id": "course-of-action--8ccd428d-39da-4e8f-a55b-d48ea1d56e58",
"type": "course-of-action",
"created": "2017-10-25T14:48:49.554Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"external_references": [
{
"source_name": "mitre-attack",
"url": "https://attack.mitre.org/mitigations/M1003",
"external_id": "M1003"
}
],
"modified": "2018-10-17T00:14:20.652Z",
"name": "Lock Bootloader",
"description": "On devices that provide the capability to unlock the bootloader (hence allowing any operating system code to be flashed onto the device), perform periodic checks to ensure that the bootloader is locked.",
"x_mitre_version": "1.0",
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5"
}
]
}