D3FEND

What is the corresponding name for the ID ‘D3-SDM’?

Answer

System Daemon Monitoring

What are the five general tactics used to classify each defensive method? (In the order they appear)

Answer

Harden, Detect, Isolate, Deceive, Evict

What open-source project retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defenses?

Answer

Sentinel2D3FEND

What does ‘File Access Pattern Analysis’ mean?

Answer

Analyzing the files accessed by a process to identify unauthorized activity.

What does ‘Local Resource Access’ artifact mean?

Answer

Ephemeral digital artifact comprising a request of a local resource and any response from that resource

Last updated