ADVANCED
Rows
Controls Deployed?
T1189 - DBC
T1190 - EPA
T1133 - ERS
T1566 - PHI
T1195 - SCC
T1199 - TR
T1078 - VA
Implementing Security Testing and Red Teaming Exercises
Y
N
?
Use Threat Intelligence Feeds
Y
N
?
Use Security Information and Event Management (SIEM) systems
Y
N
?
Use Network Traffic Analysis (NTA)
Y
N
?
Use of APT Detection and Response
Y
N
?
URL Reputation
Y
N
?
Use of Application Security Testing Tools
Y
N
?
Implementing Digital Signature and Trust Verification
Y
N
?
Multi Factor Authentication
Y
N
?
Use EDR
Y
N
?
Use Application Whitelisting
Y
N
?
Use Network Sandboxing
Y
N
?
Implement File Integrity Monitoring (FIM)
Y
N
?
Use Intrusion Detection System/Intrusion Prevention System (IDS/IPS) Solution
Y
N
?
Use Machine Learning Algorithms
Y
N
?
Implementing Browser Isolation or Virtual Browser Solutions
Y
N
?
Use Network Access Control (NAC)
Y
N
?
Security Orchestration, Automation, and Response SOAR
Y
N
?
Implement Network Segmentation
Y
N
?
Network Detect and Respond (NDR)
Y
N
?
Use Runtime Application Self-Protection (RASP)
Y
N
?
Implementing DevSecOps
Y
N
?
Use Deception Techniques
Y
N
?
Email Encryption
Y
N
?
Implement a Software Bill Of Materials (SBOM)
Y
N
?
Vendor Security Management Program
Y
N
?
Third-Party Security Assessment
Y
N
?
Conduct Background Checks
Y
N
?
Identity and Access Management (IAM)
Y
N
?
Privilege Access Management (PAM)
Y
N
?
Data Loss Prevention (DLP)
Y
N
?
Print
Clear Form
Should be Empty: