Use a data loss prevention (DLP) strategy to categorize sensitive data, identify data formats indicative of personal identifiable information (PII), and restrict exfiltration of sensitive data.[1]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1005 | Data from Local System |
Data loss prevention can restrict access to sensitive data and detect sensitive data that is unencrypted. |
|
Enterprise | T1025 | Data from Removable Media |
Data loss prevention can restrict access to sensitive data and detect sensitive data that is unencrypted. |
|
Enterprise | T1048 | Exfiltration Over Alternative Protocol |
Data loss prevention can detect and block sensitive data being uploaded via web browsers. |
|
.002 | Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
Data loss prevention can detect and block sensitive data being uploaded via web browsers. |
||
.003 | Exfiltration Over Unencrypted Non-C2 Protocol |
Data loss prevention can detect and block sensitive data being sent over unencrypted protocols. |
||
Enterprise | T1041 | Exfiltration Over C2 Channel |
Data loss prevention can detect and block sensitive data being sent over unencrypted protocols. |
|
Enterprise | T1052 | Exfiltration Over Physical Medium |
Data loss prevention can detect and block sensitive data being copied to physical mediums. |
|
.001 | Exfiltration over USB |
Data loss prevention can detect and block sensitive data being copied to USB devices. |
||
Enterprise | T1567 | Exfiltration Over Web Service |
Data loss prevention can be detect and block sensitive data being uploaded to web services via web browsers. |