CINXE.COM
Mitigations - Enterprise | MITRE ATT&CK®
<!DOCTYPE html> <html lang='en'> <head> <script async src="https://www.googletagmanager.com/gtag/js?id=UA-62667723-1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'UA-62667723-1'); </script> <meta name="google-site-verification" content="2oJKLqNN62z6AOCb0A0IXGtbQuj-lev5YPAHFF_cbHQ"/> <meta charset='utf-8'> <meta name='viewport' content='width=device-width, initial-scale=1,shrink-to-fit=no'> <meta http-equiv="X-UA-Compatible" content="IE=edge"> <link rel='shortcut icon' href="/versions/v15/theme/favicon.ico" type='image/x-icon'> <title>Mitigations - Enterprise | MITRE ATT&CK®</title> <!-- USWDS CSS --> <!-- Bootstrap CSS --> <link rel='stylesheet' href="/versions/v15/theme/style/bootstrap.min.css" /> <link rel='stylesheet' href="/versions/v15/theme/style/bootstrap-tourist.css" /> <link rel='stylesheet' href="/versions/v15/theme/style/bootstrap-select.min.css" /> <!-- Fontawesome CSS --> <link rel="stylesheet" href="/versions/v15/theme/style/fontawesome-6.5.1/css/fontawesome.min.css"/> <link rel="stylesheet" href="/versions/v15/theme/style/fontawesome-6.5.1/css/brands.min.css"/> <link rel="stylesheet" href="/versions/v15/theme/style/fontawesome-6.5.1/css/solid.min.css"/> <link rel="stylesheet" type="text/css" href="/versions/v15/theme/style.min.css?6689c2db"> </head> <body> <div class="container-fluid attack-website-wrapper d-flex flex-column h-100"> <div class="row sticky-top flex-grow-0 flex-shrink-1"> <!-- header elements --> <header class="col px-0"> <nav class='navbar navbar-expand-lg navbar-dark position-static'> <a class='navbar-brand' href="/versions/v15/"><img src="/versions/v15/theme/images/mitre_attack_logo.png" class="attack-logo"></a> <button class='navbar-toggler' type='button' data-toggle='collapse' data-target='#navbarCollapse' aria-controls='navbarCollapse' aria-expanded='false' aria-label='Toggle navigation'> <span class='navbar-toggler-icon'></span> </button> <div class='collapse navbar-collapse' id='navbarCollapse'> <ul class='nav nav-tabs ml-auto'> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="/versions/v15/matrices/" id="navbarDropdown" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> <b>Matrices</b> </a> <div class="dropdown-menu " aria-labelledby="navbarDropdown"> <a class="dropdown-item" href="/versions/v15/matrices/enterprise/">Enterprise</a> <a class="dropdown-item" href="/versions/v15/matrices/mobile/">Mobile</a> <a class="dropdown-item" href="/versions/v15/matrices/ics/">ICS</a> </div> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="/versions/v15/tactics/" id="navbarDropdown" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> <b>Tactics</b> </a> <div class="dropdown-menu " aria-labelledby="navbarDropdown"> <a class="dropdown-item" href="/versions/v15/tactics/enterprise/">Enterprise</a> <a class="dropdown-item" href="/versions/v15/tactics/mobile/">Mobile</a> <a class="dropdown-item" href="/versions/v15/tactics/ics/">ICS</a> </div> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="/versions/v15/techniques/" id="navbarDropdown" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> <b>Techniques</b> </a> <div class="dropdown-menu " aria-labelledby="navbarDropdown"> <a class="dropdown-item" href="/versions/v15/techniques/enterprise/">Enterprise</a> <a class="dropdown-item" href="/versions/v15/techniques/mobile/">Mobile</a> <a class="dropdown-item" href="/versions/v15/techniques/ics/">ICS</a> </div> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="/versions/v15/datasources" id="navbarDropdown" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> <b>Defenses</b> </a> <div class="dropdown-menu " aria-labelledby="navbarDropdown"> <a class="dropdown-item" href="/versions/v15/datasources">Data Sources</a> <div class="dropright dropdown"> <a class="dropdown-item dropdown-toggle" href="/versions/v15/mitigations/" id="navbarDropdown" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> <b>Mitigations</b> </a> <div class="dropdown-menu " aria-labelledby="navbarDropdown"> <a class="dropdown-item" href="/versions/v15/mitigations/enterprise/">Enterprise</a> <a class="dropdown-item" href="/versions/v15/mitigations/mobile/">Mobile</a> <a class="dropdown-item" href="/versions/v15/mitigations/ics/">ICS</a> </div> </div> <a class="dropdown-item" href="/versions/v15/assets">Assets</a> </div> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="/versions/v15/groups" id="navbarDropdown" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> <b>CTI</b> </a> <div class="dropdown-menu " aria-labelledby="navbarDropdown"> <a class="dropdown-item" href="/versions/v15/groups">Groups</a> <a class="dropdown-item" href="/versions/v15/software">Software</a> <a class="dropdown-item" href="/versions/v15/campaigns">Campaigns</a> </div> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="/versions/v15/resources/" id="navbarDropdown" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> <b>Resources</b> </a> <div class="dropdown-menu " aria-labelledby="navbarDropdown"> <a class="dropdown-item" href="/versions/v15/resources/">Get Started</a> <a class="dropdown-item" href="/versions/v15/resources/learn-more-about-attack/">Learn More about ATT&CK</a> <a class="dropdown-item" href="/versions/v15/resources/attackcon/">ATT&CKcon</a> <a class="dropdown-item" href="/versions/v15/resources/attack-data-and-tools/">ATT&CK Data & Tools</a> <a class="dropdown-item" href="/versions/v15/resources/faq/">FAQ</a> <a class="dropdown-item" href="/versions/v15/resources/engage-with-attack/contact/">Engage with ATT&CK</a> <a class="dropdown-item" href="/resources/versions/">Version History</a> <a class="dropdown-item" href="/versions/v15/resources/legal-and-branding/">Legal & Branding</a> </div> </li> <li class="nav-item"> <a href="/versions/v15/resources/engage-with-attack/benefactors/" class="nav-link" ><b>Benefactors</b></a> </li> <li class="nav-item"> <a href="https://medium.com/mitre-attack/" target="_blank" class="nav-link"> <b>Blog</b> <img src="/versions/v15/theme/images/external-site.svg" alt="External site" class="external-icon" /> </a> </li> <li class="nav-item"> <button id="search-button" class="btn search-button">Search <div id="search-icon" class="icon-button search-icon"></div></button> </li> </ul> </div> </nav> </header> </div> <div class="row flex-grow-0 flex-shrink-1"> <!-- banner elements --> <div class="col px-0"> <!-- don't edit or remove the line below even though it's commented out, it gets parsed and replaced by the versioning feature --> <div class="container-fluid version-banner"><div class="icon-inline baseline mr-1"><img src="/versions/v15/theme/images/icon-warning-24px.svg"></div>Currently viewing <a href="https://github.com/mitre/cti/releases/tag/ATT%26CK-v15.1" target="_blank">ATT&CK v15.1</a> which was live between April 23, 2024 and October 30, 2024. <a href="/resources/versions/">Learn more about the versioning system</a> or <a href="/">see the live site</a>.</div> </div> </div> <div class="row flex-grow-1 flex-shrink-0"> <!-- main content elements --> <!--start-indexing-for-search--> <div class="sidebar nav sticky-top flex-column pr-0 pt-4 pb-3 pl-3" id="v-tab" role="tablist" aria-orientation="vertical"> <div class="resizer" id="resizer"></div> <!--stop-indexing-for-search--> <div id="sidebars"></div> <!--start-indexing-for-search--> </div> <div class="tab-content col-xl-9 pt-4" id="v-tabContent"> <div class="tab-pane fade show active" id="v-attckmatrix" role="tabpanel" aria-labelledby="v-attckmatrix-tab"> <ol class="breadcrumb"> <li class="breadcrumb-item"><a href="/versions/v15/">Home</a></li> <li class="breadcrumb-item"><a href="/versions/v15/mitigations/ics/">Mitigations</a></li> <li class="breadcrumb-item">Enterprise</li> </ol> <div class="tab-pane fade show active" id="v-" role="tabpanel" aria-labelledby="v--tab"></div> <div class="row"> <div class="col-xl-12"> <div class="jumbotron jumbotron-fluid"> <div class="container-fluid"> <div class="overflow-x-auto"> <div class="row"> <div class="col-md-10"> <h1> Enterprise Mitigations </h1> <p> Mitigations represent security concepts and classes of technologies that can be used to prevent a technique or sub-technique from being successfully executed. </p> </div> <div class="col-md-2 div-count"> <h6 class="table-object-count">Mitigations: 43</h6> </div> </div> <div class="tables-mobile"> <table class="table table-bordered table-alternate mt-2"> <thead> <tr> <th scope="col">ID</th> <th scope="col">Name</th> <th scope="col">Description</th> </tr> </thead> <tbody> <tr> <td> <a href="/versions/v15/mitigations/M1036"> M1036 </a> </td> <td> <a href="/versions/v15/mitigations/M1036"> Account Use Policies </a> </td> <td> Configure features related to account use like login attempt lockouts, specific login times, etc. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1015"> M1015 </a> </td> <td> <a href="/versions/v15/mitigations/M1015"> Active Directory Configuration </a> </td> <td> Configure Active Directory to prevent use of certain techniques; use SID Filtering, etc. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1049"> M1049 </a> </td> <td> <a href="/versions/v15/mitigations/M1049"> Antivirus/Antimalware </a> </td> <td> Use signatures or heuristics to detect malicious software. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1013"> M1013 </a> </td> <td> <a href="/versions/v15/mitigations/M1013"> Application Developer Guidance </a> </td> <td> This mitigation describes any guidance or training given to developers of applications to avoid introducing security weaknesses that an adversary may be able to take advantage of. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1048"> M1048 </a> </td> <td> <a href="/versions/v15/mitigations/M1048"> Application Isolation and Sandboxing </a> </td> <td> Restrict execution of code to a virtual environment on or in transit to an endpoint system. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1047"> M1047 </a> </td> <td> <a href="/versions/v15/mitigations/M1047"> Audit </a> </td> <td> Perform audits or scans of systems, permissions, insecure software, insecure configurations, etc. to identify potential weaknesses. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1040"> M1040 </a> </td> <td> <a href="/versions/v15/mitigations/M1040"> Behavior Prevention on Endpoint </a> </td> <td> Use capabilities to prevent suspicious behavior patterns from occurring on endpoint systems. This could include suspicious process, file, API call, etc. behavior. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1046"> M1046 </a> </td> <td> <a href="/versions/v15/mitigations/M1046"> Boot Integrity </a> </td> <td> Use secure methods to boot a system and verify the integrity of the operating system and loading mechanisms. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1045"> M1045 </a> </td> <td> <a href="/versions/v15/mitigations/M1045"> Code Signing </a> </td> <td> Enforce binary and application integrity with digital signature verification to prevent untrusted code from executing. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1043"> M1043 </a> </td> <td> <a href="/versions/v15/mitigations/M1043"> Credential Access Protection </a> </td> <td> Use capabilities to prevent successful credential access by adversaries; including blocking forms of credential dumping. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1053"> M1053 </a> </td> <td> <a href="/versions/v15/mitigations/M1053"> Data Backup </a> </td> <td> Take and store data backups from end user systems and critical servers. Ensure backup and storage systems are hardened and kept separate from the corporate network to prevent compromise. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1057"> M1057 </a> </td> <td> <a href="/versions/v15/mitigations/M1057"> Data Loss Prevention </a> </td> <td> Use a data loss prevention (DLP) strategy to categorize sensitive data, identify data formats indicative of personal identifiable information (PII), and restrict exfiltration of sensitive data. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1042"> M1042 </a> </td> <td> <a href="/versions/v15/mitigations/M1042"> Disable or Remove Feature or Program </a> </td> <td> Remove or deny access to unnecessary and potentially vulnerable software to prevent abuse by adversaries. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1055"> M1055 </a> </td> <td> <a href="/versions/v15/mitigations/M1055"> Do Not Mitigate </a> </td> <td> This category is to associate techniques that mitigation might increase risk of compromise and therefore mitigation is not recommended. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1041"> M1041 </a> </td> <td> <a href="/versions/v15/mitigations/M1041"> Encrypt Sensitive Information </a> </td> <td> Protect sensitive information with strong encryption. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1039"> M1039 </a> </td> <td> <a href="/versions/v15/mitigations/M1039"> Environment Variable Permissions </a> </td> <td> Prevent modification of environment variables by unauthorized users and groups. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1038"> M1038 </a> </td> <td> <a href="/versions/v15/mitigations/M1038"> Execution Prevention </a> </td> <td> Block execution of code on a system through application control, and/or script blocking. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1050"> M1050 </a> </td> <td> <a href="/versions/v15/mitigations/M1050"> Exploit Protection </a> </td> <td> Use capabilities to detect and block conditions that may lead to or be indicative of a software exploit occurring. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1037"> M1037 </a> </td> <td> <a href="/versions/v15/mitigations/M1037"> Filter Network Traffic </a> </td> <td> Use network appliances to filter ingress or egress traffic and perform protocol-based filtering. Configure software on endpoints to filter network traffic. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1035"> M1035 </a> </td> <td> <a href="/versions/v15/mitigations/M1035"> Limit Access to Resource Over Network </a> </td> <td> Prevent access to file shares, remote access to systems, unnecessary services. Mechanisms to limit access may include use of network concentrators, RDP gateways, etc. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1034"> M1034 </a> </td> <td> <a href="/versions/v15/mitigations/M1034"> Limit Hardware Installation </a> </td> <td> Block users or groups from installing or using unapproved hardware on systems, including USB devices. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1033"> M1033 </a> </td> <td> <a href="/versions/v15/mitigations/M1033"> Limit Software Installation </a> </td> <td> Block users or groups from installing unapproved software. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1032"> M1032 </a> </td> <td> <a href="/versions/v15/mitigations/M1032"> Multi-factor Authentication </a> </td> <td> Use two or more pieces of evidence to authenticate to a system; such as username and password in addition to a token from a physical smart card or token generator. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1031"> M1031 </a> </td> <td> <a href="/versions/v15/mitigations/M1031"> Network Intrusion Prevention </a> </td> <td> Use intrusion detection signatures to block traffic at network boundaries. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1030"> M1030 </a> </td> <td> <a href="/versions/v15/mitigations/M1030"> Network Segmentation </a> </td> <td> Architect sections of the network to isolate critical systems, functions, or resources. Use physical and logical segmentation to prevent access to potentially sensitive systems and information. Use a DMZ to contain any internet-facing services that should not be exposed from the internal network. Configure separate virtual private cloud (VPC) instances to isolate critical cloud systems. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1028"> M1028 </a> </td> <td> <a href="/versions/v15/mitigations/M1028"> Operating System Configuration </a> </td> <td> Make configuration changes related to the operating system or a common feature of the operating system that result in system hardening against techniques. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1027"> M1027 </a> </td> <td> <a href="/versions/v15/mitigations/M1027"> Password Policies </a> </td> <td> Set and enforce secure password policies for accounts. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1056"> M1056 </a> </td> <td> <a href="/versions/v15/mitigations/M1056"> Pre-compromise </a> </td> <td> This category is used for any applicable mitigation activities that apply to techniques occurring before an adversary gains Initial Access, such as Reconnaissance and Resource Development techniques. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1026"> M1026 </a> </td> <td> <a href="/versions/v15/mitigations/M1026"> Privileged Account Management </a> </td> <td> Manage the creation, modification, use, and permissions associated to privileged accounts, including SYSTEM and root. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1025"> M1025 </a> </td> <td> <a href="/versions/v15/mitigations/M1025"> Privileged Process Integrity </a> </td> <td> Protect processes with high privileges that can be used to interact with critical system components through use of protected process light, anti-process injection defenses, or other process integrity enforcement measures. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1029"> M1029 </a> </td> <td> <a href="/versions/v15/mitigations/M1029"> Remote Data Storage </a> </td> <td> Use remote security log and sensitive file storage where access can be controlled better to prevent exposure of intrusion detection log data or sensitive information. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1022"> M1022 </a> </td> <td> <a href="/versions/v15/mitigations/M1022"> Restrict File and Directory Permissions </a> </td> <td> Restrict access by setting directory and file permissions that are not specific to users or privileged accounts. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1044"> M1044 </a> </td> <td> <a href="/versions/v15/mitigations/M1044"> Restrict Library Loading </a> </td> <td> Prevent abuse of library loading mechanisms in the operating system and software to load untrusted code by configuring appropriate library loading mechanisms and investigating potential vulnerable software. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1024"> M1024 </a> </td> <td> <a href="/versions/v15/mitigations/M1024"> Restrict Registry Permissions </a> </td> <td> Restrict the ability to modify certain hives or keys in the Windows Registry. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1021"> M1021 </a> </td> <td> <a href="/versions/v15/mitigations/M1021"> Restrict Web-Based Content </a> </td> <td> Restrict use of certain websites, block downloads/attachments, block Javascript, restrict browser extensions, etc. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1054"> M1054 </a> </td> <td> <a href="/versions/v15/mitigations/M1054"> Software Configuration </a> </td> <td> Implement configuration changes to software (other than the operating system) to mitigate security risks associated to how the software operates. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1020"> M1020 </a> </td> <td> <a href="/versions/v15/mitigations/M1020"> SSL/TLS Inspection </a> </td> <td> Break and inspect SSL/TLS sessions to look at encrypted web traffic for adversary activity. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1019"> M1019 </a> </td> <td> <a href="/versions/v15/mitigations/M1019"> Threat Intelligence Program </a> </td> <td> A threat intelligence program helps an organization generate their own threat intelligence information and track trends to inform defensive priorities to mitigate risk. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1051"> M1051 </a> </td> <td> <a href="/versions/v15/mitigations/M1051"> Update Software </a> </td> <td> Perform regular software updates to mitigate exploitation risk. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1052"> M1052 </a> </td> <td> <a href="/versions/v15/mitigations/M1052"> User Account Control </a> </td> <td> Configure Windows User Account Control to mitigate risk of adversaries obtaining elevated process access. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1018"> M1018 </a> </td> <td> <a href="/versions/v15/mitigations/M1018"> User Account Management </a> </td> <td> Manage the creation, modification, use, and permissions associated to user accounts. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1017"> M1017 </a> </td> <td> <a href="/versions/v15/mitigations/M1017"> User Training </a> </td> <td> Train users to be aware of access or manipulation attempts by an adversary to reduce the risk of successful spearphishing, social engineering, and other techniques that involve user interaction. </td> </tr> <tr> <td> <a href="/versions/v15/mitigations/M1016"> M1016 </a> </td> <td> <a href="/versions/v15/mitigations/M1016"> Vulnerability Scanning </a> </td> <td> Vulnerability scanning is used to find potentially exploitable software vulnerabilities to remediate them. </td> </tr> </tbody> </table> </div> </div> </div> </div> </div> </div> </div> </div> <!--stop-indexing-for-search--> <!-- search overlay for entire page -- not displayed inline --> <div class="overlay search" id="search-overlay" style="display: none;"> <div class="overlay-inner"> <!-- text input for searching --> <div class="search-header"> <div class="search-input"> <input type="text" id="search-input" placeholder="search"> </div> <div class="search-icons"> <div class="search-parsing-icon spinner-border" style="display: none" id="search-parsing-icon"></div> <div class="close-search-icon" id="close-search-icon">×</div> </div> </div> <!-- results and controls for loading more results --> <div id="search-body" class="search-body"> <div class="results" id="search-results"> <!-- content will be appended here on search --> </div> <div id="load-more-results" class="load-more-results"> <button class="btn btn-default" id="load-more-results-button">load more results</button> </div> </div> </div> </div> </div> <div class="row flex-grow-0 flex-shrink-1"> <!-- footer elements --> <footer class="col footer"> <div class="container-fluid"> <div class="row row-footer"> <div class="col-2 col-sm-2 col-md-2"> <div class="footer-center-responsive my-auto"> <a href="https://www.mitre.org" target="_blank" rel="noopener" aria-label="MITRE"> <img src="/versions/v15/theme/images/mitrelogowhiteontrans.gif" class="mitre-logo-wtrans"> </a> </div> </div> <div class="col-2 col-sm-2 footer-responsive-break"></div> <div class="footer-link-group"> <div class="row row-footer"> <div class="px-3 col-footer"> <u class="footer-link"><a href="/versions/v15/resources/engage-with-attack/contact" class="footer-link">Contact Us</a></u> </div> <div class="px-3 col-footer"> <u class="footer-link"><a href="/versions/v15/resources/legal-and-branding/terms-of-use" class="footer-link">Terms of Use</a></u> </div> <div class="px-3 col-footer"> <u class="footer-link"><a href="/versions/v15/resources/legal-and-branding/privacy" class="footer-link">Privacy Policy</a></u> </div> <div class="px-3"> <u class="footer-link"><a href="/versions/v15/resources/changelog.html" class="footer-link" data-toggle="tooltip" data-placement="top" data-html="true" title="ATT&CK content v15.1
Website v4.1.6">Website Changelog</a></u> </div> </div> <div class="row"> <small class="px-3"> © 2015 - 2024, The MITRE Corporation. MITRE ATT&CK and ATT&CK are registered trademarks of The MITRE Corporation. </small> </div> </div> <div class="w-100 p-2 footer-responsive-break"></div> <div class="col pr-4"> <div class="footer-float-right-responsive-brand"> <div class="row row-footer row-footer-icon"> <div class="mb-1"> <a href="https://twitter.com/MITREattack" class="btn btn-footer"> <i class="fa-brands fa-x-twitter fa-lg"></i> </a> <a href="https://github.com/mitre-attack" class="btn btn-footer"> <i class="fa-brands fa-github fa-lg"></i> </a> </div> </div> </div> </div> </div> </div> </div> </footer> </div> </div> <!--stopindex--> </div> <!--SCRIPTS--> <script src="/versions/v15/theme/scripts/jquery-3.5.1.min.js"></script> <script src="/versions/v15/theme/scripts/popper.min.js"></script> <script src="/versions/v15/theme/scripts/bootstrap-select.min.js"></script> <script src="/versions/v15/theme/scripts/bootstrap.bundle.min.js"></script> <script src="/versions/v15/theme/scripts/site.js?4342"></script> <script src="/versions/v15/theme/scripts/settings.js?3107"></script> <script src="/versions/v15/theme/scripts/search_bundle.js"></script> <!--SCRIPTS--> <script src="/versions/v15/theme/scripts/resizer.js"></script> <!--SCRIPTS--> <script src="/versions/v15/theme/scripts/sidebar-load-all.js"></script> </body> </html>