welcome to Maduro won less than five mitigations.
In this lesson, we will define and explore what an attack mitigation is.
Identify where to find these mitigations and finally build an appreciation for how these mitigations fit into the attack model.
As you recall from our last lesson, attack techniques and some techniques have a wealth of metadata, and in this lesson, we're going to explore the mitigation section.
Attack defines mitigations as configurations, tools or processes that we can as defenders used to prevent a technique from being successful or having the desired outcome for an adversary.
You can think of these as hardening recommendations intended to allow us to take actions such as changing policies or configurations are deploying certain tools.
As we saw previously.
Mitigations are populated on technique pages where you can see how these mitigations are directly applied to preventing a particular adversary behavior.
These mitigations are listed in the section shown below, as well as a short description of how this mitigation actually applies to the relevant adversary behavior.
While we can see these mitigations from the perspective of the techniques and some techniques where they applied,
we can also click on each one of these mitigations and CIA paid specific to that mitigation.
An example of that page is shown here where you can see the name of the mitigation as well as a short description.
These mitigations are also objects in the attack model and they have their own associated ideas as you see on the right. In this case, the mitigation is labelled in 10 42
towards the bottom of these pages. You can also see how this mitigation is applied to various other techniques and some techniques.
And with that, we've returned all this check for this lesson.
Which of the following is most accurate? Mitigations can help us,
please positive video and take a second to think of the correct answer before proceeding.
In this case, the correct answer is B
mitigations can help us hard our network to prevent successful adversary behaviors
in summary attack communications or recommendations for how we can prevent successful execution of specific adversary behaviors.
And finally, mitigations are mapped to specific techniques and some techniques
and are displayed on those pages as well as on their own mitigation page.