Skip to content

M0922 Restrict File and Directory Permissions

Restrict access by setting directory and file permissions that are not specific to users or privileged accounts.

Item Value
ID M0922
Version 1.0
Created 06 June 2019
Last Modified 30 March 2023
Navigation Layer View In ATT&CK® Navigator

Techniques Addressed by Mitigation

Domain ID Name Use
ics T0809 Data Destruction Protect files stored locally with proper permissions to limit opportunities for adversaries to impact data storage. 1
ics T0811 Data from Information Repositories Protect files with proper permissions to limit opportunities for adversaries to interact and collect information from databases. 2 1
ics T0893 Data from Local System Protect files stored locally with proper permissions to limit opportunities for adversaries to interact and collect information from the local system. 2 1
ics T0872 Indicator Removal on Host Protect files stored locally with proper permissions to limit opportunities for adversaries to remove indicators of their activity on the system. 2 1
ics T0849 Masquerading Use file system access controls to protect system and application folders.
ics T0873 Project File Infection Ensure permissions restrict project file access to only engineer and technician user groups and accounts.
ics T0881 Service Stop Ensure proper process and file permissions are in place to inhibit adversaries from disabling or interfering with critical services.
ics T0882 Theft of Operational Information Protect files stored locally with proper permissions to limit opportunities for adversaries to interact and collect information from databases. 2 1

References