{ "id": "bundle--547d2fc9-53a3-4e10-967c-918bf427020b", "objects": [ { "created": "2014-06-23T00:00:00.000Z", "created_by_ref": "identity--e50ab59c-5c4f-4d40-bf6a-d58418d89bcd", "description": "Design: Input validation. Assume that user inputs are malicious. Utilize strict type, character, and encoding enforcement", "id": "course-of-action--03927772-a50c-42a3-b4ff-f72892917b5e", "modified": "2022-09-29T00:00:00.000Z", "name": "coa-139-0", "object_marking_refs": [ "marking-definition--17d82bb2-eeeb-4898-bda5-3ddbcd2b799d" ], "spec_version": "2.1", "type": "course-of-action", "x_capec_version": "3.9" } ], "type": "bundle" }