{ "type": "bundle", "id": "bundle--65d01bdf-a4c6-4920-9bc0-71997300128e", "spec_version": "2.0", "objects": [ { "modified": "2022-10-24T15:09:07.609Z", "name": "Mitigation Limited or Not Effective", "description": "This type of attack technique cannot be easily mitigated with preventative controls since it is based on the abuse of system features.", "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", "x_mitre_domains": [ "ics-attack" ], "x_mitre_version": "1.0", "x_mitre_attack_spec_version": "2.1.0", "type": "course-of-action", "id": "course-of-action--469b78dd-a54d-4f7c-8c3b-4a1dd916b433", "created": "2020-09-11T16:32:21.854Z", "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", "external_references": [ { "source_name": "mitre-attack", "url": "https://attack.mitre.org/mitigations/M0816", "external_id": "M0816" } ], "object_marking_refs": [ "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" ] } ] }