A deep dive into the techniques in the network framework
Now that endpoints have been covered, we’ll take a deeper look at the network matrix. One interesting note about this matrix is that network is very vague, as there can be many different components that make up a network, and that means that the implementation of the mitigation and detection strategies will have to be heavily tweaked to fit your environment. There is only one matrix, whereas we saw in the cloud, there were multiple, so that means that there are some controls that won’t apply to your environment at all, depending on how it is configured. The network matrix looks like this:
- Initial Access
- Exploit Public Facing Application
- Execution
- Command and Scripting Interpreter
- Persistence
- Modify Authentication Process, Pre-OS Boot, and Traffic Signaling
- Defense Evasion
- Impair Defenses, Indicator Removal on Host, Modify Authentication Process, Modify System Image, Network Boundary Bridging, Pre...