M0917 User Training
Train users to be aware of access or manipulation attempts by an adversary to reduce the risk of successful spearphishing, social engineering, and other techniques that involve user interaction.
Techniques Addressed by Mitigation
Domain |
ID |
Name |
Use |
ics |
T0811 |
Data from Information Repositories |
Develop and publish policies that define acceptable information to be stored in repositories. |
|
|
|
|
ics |
T0893 |
Data from Local System |
Develop and publish policies that define acceptable information to be stored on local systems. |
ics |
T0865 |
Spearphishing Attachment |
Users can be trained to identify social engineering techniques and spearphishing emails. |
|
|
|
|
ics |
T0863 |
User Execution |
Use user training as a way to bring awareness to common phishing and spearphishing techniques and how to raise suspicion for potentially malicious events. |
|
|
|
|