M0922 Restrict File and Directory Permissions
Restrict access by setting directory and file permissions that are not specific to users or privileged accounts.
Techniques Addressed by Mitigation
Domain |
ID |
Name |
Use |
ics |
T0809 |
Data Destruction |
Protect files stored locally with proper permissions to limit opportunities for adversaries to impact data storage. |
|
|
|
|
ics |
T0811 |
Data from Information Repositories |
Protect files with proper permissions to limit opportunities for adversaries to interact and collect information from databases. |
|
|
|
|
ics |
T0893 |
Data from Local System |
Protect files stored locally with proper permissions to limit opportunities for adversaries to interact and collect information from the local system. |
ics |
T0872 |
Indicator Removal on Host |
Protect files stored locally with proper permissions to limit opportunities for adversaries to remove indicators of their activity on the system. |
|
|
|
|
ics |
T0849 |
Masquerading |
Use file system access controls to protect system and application folders. |
|
|
|
|
ics |
T0873 |
Project File Infection |
Ensure permissions restrict project file access to only engineer and technician user groups and accounts. |
|
|
|
|
ics |
T0881 |
Service Stop |
Ensure proper process and file permissions are in place to inhibit adversaries from disabling or interfering with critical services. |
|
|
|
|
ics |
T0882 |
Theft of Operational Information |
Protect files stored locally with proper permissions to limit opportunities for adversaries to interact and collect information from databases. |
|
|
|
|
References