Skip to content

M0941 Encrypt Sensitive Information

Protect sensitive data-at-rest with strong encryption.

Item Value
ID M0941
Version 1.0
Created 11 June 2019
Last Modified 30 March 2023
Navigation Layer View In ATT&CK® Navigator

Techniques Addressed by Mitigation

Domain ID Name Use
ics T0811 Data from Information Repositories Information which is sensitive to the operation and architecture of the process environment may be encrypted to ensure confidentiality and restrict access to only those who need to know. 2 1
ics T0893 Data from Local System Information which is sensitive to the operation and architecture of the process environment may be encrypted to ensure confidentiality and restrict access to only those who need to know. 2 1
ics T0839 Module Firmware The encryption of firmware should be considered to prevent adversaries from identifying possible vulnerabilities within the firmware.
ics T0873 Project File Infection When at rest, project files should be encrypted to prevent unauthorized changes. 1
ics T0857 System Firmware The encryption of firmware should be considered to prevent adversaries from identifying possible vulnerabilities within the firmware.
ics T0882 Theft of Operational Information Encrypt any operational data with strong confidentiality requirements, including organizational trade-secrets, recipes, and other intellectual property (IP).
ics T0864 Transient Cyber Asset Consider implementing full disk encryption, especially if engineering workstations are transient assets that are more likely to be lost, stolen, or tampered with. 1

References