Network Segmentation

Architect sections of the network to isolate critical systems, functions, or resources. Use physical and logical segmentation to prevent access to potentially sensitive systems and information. Use a DMZ to contain any internet-facing services that should not be exposed from the internal network. Configure separate virtual private cloud (VPC) instances to isolate critical cloud systems.

ID: M1030
Version: 1.1
Created: 10 June 2019
Last Modified: 14 May 2020

Techniques Addressed by Mitigation

Domain ID Name Use
Enterprise T1557 中间人攻击

Network segmentation can be used to isolate infrastructure components that do not require broad network access. This may mitigate, or at least alleviate, the scope of AiTM activity.

.001 LLMNR/NBT-NS Poisoning and SMB Relay

Network segmentation can be used to isolate infrastructure components that do not require broad network access. This may mitigate, or at least alleviate, the scope of AiTM activity.

Enterprise T1602 从配置存储库获取数据

Segregate SNMP traffic on a separate management network.[1]

.001 SNMP (MIB Dump)

Segregate SNMP traffic on a separate management network.[1]

.002 Network Device Configuration Dump

Segregate SNMP traffic on a separate management network.[1]

Enterprise T1199 信任关系

Network segmentation can be used to isolate infrastructure components that do not require broad network access.

Enterprise T1136 创建账户

Configure access controls and firewalls to limit access to domain controllers and systems used to create and manage accounts.

.002 Domain Account

Configure access controls and firewalls to limit access to domain controllers and systems used to create and manage accounts.

.003 Cloud Account

Configure access controls and firewalls to limit access to critical systems and domain controllers. Most cloud environments support separate virtual private cloud (VPC) instances that enable further segmentation of cloud systems.

Enterprise T1190 利用公开应用程序漏洞

Segment externally facing servers and services from the rest of the network with a DMZ or on separate hosting infrastructure.

Enterprise T1612 在主机上构建镜像

Deny direct remote access to internal systems through the use of network proxies, gateways, and firewalls.

Enterprise T1482 域信任发现

Employ network segmentation for sensitive domains.[2].

Enterprise T1133 外部远程服务

Deny direct remote access to internal systems through the use of network proxies, gateways, and firewalls.

Enterprise T1613 容器与资源发现

Deny direct remote access to internal systems through the use of network proxies, gateways, and firewalls.

Enterprise T1565 数据操控

Identify critical business and system processes that may be targeted by adversaries and work to isolate and secure those systems against unauthorized access and tampering.

.003 Runtime Data Manipulation

Identify critical business and system processes that may be targeted by adversaries and work to isolate and secure those systems against unauthorized access and tampering.

Enterprise T1048 替代协议渗出

Follow best practices for network firewall configurations to allow only necessary ports and traffic to enter and exit the network.[3]

.001 Exfiltration Over Symmetric Encrypted Non-C2 Protocol

Follow best practices for network firewall configurations to allow only necessary ports and traffic to enter and exit the network.[3]

.002 Exfiltration Over Asymmetric Encrypted Non-C2 Protocol

Follow best practices for network firewall configurations to allow only necessary ports and traffic to enter and exit the network.[3]

.003 Exfiltration Over Unencrypted Non-C2 Protocol

Follow best practices for network firewall configurations to allow only necessary ports and traffic to enter and exit the network.[3]

Enterprise T1489 服务停止

Operate intrusion detection, analysis, and response systems on a separate network from the production environment to lessen the chances that an adversary can see and interfere with critical response functions.

Enterprise T1552 .007 未加密凭证: Container API

Deny direct remote access to internal systems through the use of network proxies, gateways, and firewalls.

Enterprise T1040 网络嗅探

Deny direct access of broadcasts and multicast sniffing, and prevent attacks such as LLMNR/NBT-NS Poisoning and SMB Relay

Enterprise T1046 网络服务发现

Ensure proper network segmentation is followed to protect critical servers and devices.

Enterprise T1098 账号操控

Configure access controls and firewalls to limit access to critical systems and domain controllers. Most cloud environments support separate virtual private cloud (VPC) instances that enable further segmentation of cloud systems.

.001 Additional Cloud Credentials

Configure access controls and firewalls to limit access to critical systems and domain controllers. Most cloud environments support separate virtual private cloud (VPC) instances that enable further segmentation of cloud systems.

Enterprise T1072 软件部署工具

Ensure proper system isolation for critical network systems through use of firewalls.

Enterprise T1021 .001 远程服务: Remote Desktop Protocol

Do not leave RDP accessible from the internet. Enable firewall rules to block RDP traffic between network security zones within a network.

.003 远程服务: Distributed Component Object Model

Enable Windows firewall, which prevents DCOM instantiation by default.

.006 远程服务: Windows Remote Management

If the service is necessary, lock down critical enclaves with separate WinRM infrastructure and follow WinRM best practices on use of host firewalls to restrict WinRM access to allow communication only to/from specific devices.[4]

Enterprise T1563 远程服务会话劫持

Enable firewall rules to block unnecessary traffic between network security zones within a network.

.002 RDP Hijacking

Enable firewall rules to block RDP traffic between network security zones within a network.

Enterprise T1210 远程服务漏洞利用

Segment networks and systems appropriately to reduce access to critical systems and services to controlled methods.

Enterprise T1610 部署容器

Deny direct remote access to internal systems through the use of network proxies, gateways, and firewalls.

Enterprise T1095 非应用层协议

Properly configure firewalls and proxies to limit outgoing traffic to only necessary ports and through proper network gateway systems. Also ensure hosts are only provisioned to communicate over authorized interfaces.

Enterprise T1571 非标准端口

Properly configure firewalls and proxies to limit outgoing traffic to only necessary ports for that particular network segment.

References