MITRE D3FEND – Flashcards
(50 cards)
What is MITRE D3FEND?
A framework that describes defensive techniques to counter known adversary behaviors documented in MITRE ATT&CK.
What is the main goal of D3FEND?
To standardize and document cyber defense techniques against real-world threats.
What type of model is D3FEND based on?
A knowledge graph model that shows relationships between defense techniques and threat behaviors.
How does D3FEND complement MITRE ATT&CK?
D3FEND maps defensive capabilities directly to the offensive techniques in ATT&CK.
Name a major category in D3FEND techniques.
Harden, Detect, Deceive, Evict, or Isolate.
What category focuses on prevention measures like patching and configuration?
Harden
What category includes methods like logging and monitoring?
Detect
What does the “Deceive” category in D3FEND involve?
Using techniques like honeypots and decoy credentials to mislead attackers.
Which category includes stopping or removing adversaries from systems?
Evict
Which D3FEND category involves segmenting systems to prevent attacker movement?
Isolate
What is “Credential Hash Storage Protection”?
A D3FEND hardening technique that protects against credential theft (e.g., LSASS memory dumps).
What is “Process Argument Analysis”?
A detection technique analyzing command-line arguments for malicious patterns.
What is “Network Traffic Analysis”?
A detection technique that monitors network data to detect anomalies or C2 traffic.
What is “Executable Allowlisting”?
A hardening technique that allows only trusted applications to run on a system.
What does “Decoy File” mean in D3FEND?
A file placed intentionally to detect or mislead attackers when accessed.
What is “DNS Traffic Analysis”?
A detection technique that analyzes DNS queries to uncover potential command-and-control activity.
What is “Host-Based Firewall Rules”?
A hardening technique involving custom firewall configurations at the host level.
What is “Memory Access Pattern Analysis”?
Detecting malicious behavior by analyzing how memory is accessed.
What is “Software Update”?
A hardening measure to prevent exploitation of known vulnerabilities.
Which ATT&CK technique can be countered by D3FEND’s “Multi-Factor Authentication”?
Valid Accounts (T1078).
What ATT&CK technique is countered by “Executable Allowlisting”?
Scripting / Command and Scripting Interpreter (T1059).
Which D3FEND technique helps detect lateral movement using PsExec?
Process Creation Analysis and Network Connection Monitoring.
What D3FEND technique counters LSASS dumping?
Credential Hash Storage Protection.
What technique in D3FEND can help detect phishing payloads?
Attachment Inspection and Email Behavior Analysis.