Malicious and Direct
Directly harmful objective
ENTITY
1 - Human
INTENT
1 - Intentional
TIMING
3 - Other
Risk ID
mit1441
Domain lineage
4. Malicious Actors & Misuse
4.0 > Malicious use
Mitigation strategy
1. Prioritize the Defense of Elevated Privileges and Accounts. Implement mandatory Multi-Factor Authentication (MFA) for all users, particularly those with remote access or elevated system privileges, to mitigate credential theft and reuse. Furthermore, utilize Privileged Access Management (PAM) solutions to enforce the principle of least privilege and automate fine-grained access controls. 2. Mandate the Timely Application of Patches and Updates. Establish and enforce an aggressive patch management policy requiring the immediate application of security updates for all operating systems, applications, and network boundary devices to remediate exploitable software vulnerabilities before malicious actors can utilize them. 3. Implement an Encrypted, Exercised System Recovery Plan. Develop a comprehensive disaster recovery strategy that includes multiple, segregated backups of critical data and configurations. These backups must be encrypted, stored offsite or offline when not in use, and regularly tested through recovery exercises to ensure the complete and timely reconstitution of systems following a destructive incident.