Using MITRE D3F3ND for Cyber Threat Intelligence

Using MITRE D3FEND for cyber threat intelligence


Inferred relationship from MITRE D3FEND
Identifying countermeasures using D3FEND artifacts for account creation technique
D3-DAM: Domain Account Monitoring and their related ATT&CK techniques
D3FEND Inferred Relationship for artifact D3-DAM: Global administrator account for Office 365



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Rishika Desai

Rishika Desai

Cyber threat intelligence is exciting and I am even more excited to share as I learn. Pizzas, books, and animal lover. Also, a full time pet mom!