D3FEND
What is the corresponding name for the ID ‘D3-SDM’?
Answer
System Daemon Monitoring
What are the five general tactics used to classify each defensive method? (In the order they appear)
Answer
Harden, Detect, Isolate, Deceive, Evict
What open-source project retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defenses?
Answer
Sentinel2D3FEND
What does ‘File Access Pattern Analysis’ mean?
Answer
Analyzing the files accessed by a process to identify unauthorized activity.
What does ‘Local Resource Access’ artifact mean?
Answer
Ephemeral digital artifact comprising a request of a local resource and any response from that resource.