{ "type": "bundle", "id": "bundle--a8b7925d-048c-471a-9c25-bb480b18ffd4", "spec_version": "2.0", "objects": [ { "x_mitre_domains": [ "enterprise-attack" ], "object_marking_refs": [ "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" ], "id": "course-of-action--245075bc-f992-4d89-af8c-834c53d403f4", "type": "course-of-action", "created": "2019-04-24T17:03:39.689Z", "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", "external_references": [ { "external_id": "T1493", "source_name": "mitre-attack", "url": "https://attack.mitre.org/mitigations/T1493" } ], "modified": "2019-07-25T12:28:59.970Z", "name": "Transmitted Data Manipulation Mitigation", "description": "Identify critical business and system processes that may be targeted by adversaries and work to secure communications related to those processes against tampering. Encrypt all important data flows to reduce the impact of tailored modifications on data in transit.", "x_mitre_deprecated": true, "x_mitre_version": "1.0", "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" } ] }