{"description": "Enterprise techniques mitigated by Pre-compromise, ATT&CK mitigation M1056 (v1.1)", "name": "Pre-compromise (M1056)", "domain": "enterprise-attack", "versions": {"layer": "4.5", "attack": "19", "navigator": "5.3.2"}, "techniques": [{"techniqueID": "T1650", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. ", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1583", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "showSubtechniques": true}, {"techniqueID": "T1583.001", "comment": "Organizations may intentionally register similar domains to their own to deter adversaries from creating typosquatting domains. Other facets of this technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1583.002", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1583.003", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1583.004", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1583.005", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1583.006", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1583.007", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. ", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1583.008", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should be focused on initial access activities, such as drive by compromise where ad blocking adblockers can help prevent malicious code from executing.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1595", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1595.001", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1595.002", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1595.003", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1586", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "showSubtechniques": true}, {"techniqueID": "T1586.001", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1586.002", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1586.003", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1584", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "showSubtechniques": true}, {"techniqueID": "T1584.001", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1584.002", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1584.003", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1584.004", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1584.005", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1584.006", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1584.007", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. ", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1584.008", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1587", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "showSubtechniques": true}, {"techniqueID": "T1587.001", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1587.002", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1587.003", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1587.004", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1585", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "showSubtechniques": true}, {"techniqueID": "T1585.001", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1585.002", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1585.003", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. ", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1592", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "showSubtechniques": true}, {"techniqueID": "T1592.001", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1592.002", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1592.003", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1592.004", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1589", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "showSubtechniques": true}, {"techniqueID": "T1589.001", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1589.002", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1589.003", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1590", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "showSubtechniques": true}, {"techniqueID": "T1590.001", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1590.003", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1590.004", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1590.005", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1590.006", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1591", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1591.001", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1591.002", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1591.003", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1591.004", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1683", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on designing defenses that are not reliant on atomic indicators. ", "score": 1, "showSubtechniques": true}, {"techniqueID": "T1683.001", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on designing defenses that are not reliant on atomic indicators. ", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1683.002", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on designing defenses that are not reliant on atomic indicators. ", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1588", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "showSubtechniques": true}, {"techniqueID": "T1588.001", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1588.002", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1588.003", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1588.004", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1588.005", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1588.006", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1588.007", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1682", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on designing defenses that are not reliant on atomic indicators.", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1597", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "showSubtechniques": true}, {"techniqueID": "T1597.001", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1597.002", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1596", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "showSubtechniques": true}, {"techniqueID": "T1596.001", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1596.002", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1596.003", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1596.004", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1596.005", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1593", "showSubtechniques": true}, {"techniqueID": "T1593.001", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1593.002", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1681", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on designing defenses that are not reliant on atomic indicators.", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1594", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1608", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "showSubtechniques": true}, {"techniqueID": "T1608.001", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1608.002", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1608.003", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1608.004", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1608.005", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1608.006", "comment": "This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls.", "score": 1, "color": "#66b1ff", "showSubtechniques": true}], "gradient": {"colors": ["#ffffff", "#66b1ff"], "minValue": 0, "maxValue": 1}, "legendItems": [{"label": "mitigated by Pre-compromise", "color": "#66b1ff"}]}