Configure devices, systems, networks, etc. to contain activity and data in order to promote inspection or prevent expanding an engagement beyond desired limits.
Using isolation, a defender can prevent potentially malicious activity before it starts or limit its effectiveness and scope. A defender can observe behaviors of adversaries or their tools without exposing them to unintended targets.
ID | Description |
---|---|
DOS0010 | There is an opportunity to test hardware additions in an isolated environment and ensure they can't be used by an adversary. |
DOS0012 | There is an opportunity to prevent an adversary from using removable media to compromise disconnected or air-gapped systems. |
DOS0160 | There is an opportunity to detect an unknown process that is being used for command and control and disrupt it. |
ID | Description |
---|---|
DUC0010 | A defender can install any suspect hardware on an isolated system and monitor for non-standard behaviors. |
DUC0014 | A defender can setup protections so removeable media cannot be mounted until an isolated review process has cleared the drive. |
DUC0160 | A defender can isolate unknown processes that are being used for command and control and prevent them from being able to access the internet. |
ID | Description |
---|---|
DPR0040 | Unplug an infected system from the network and disable any other means of communication. |
DPR0066 | Run all user applications in isolated containers to prevent a compromise from expanding beyond the container's boundaries. |
ID | Name | ATT&CK Tactics |
---|---|---|
T1091 | Replication Through Removable Media | Lateral Movement, Initial Access |
T1104 | Multi-Stage Channels | Command and Control |
T1200 | Hardware Additions | Initial Access |