Skip to content

Commit ade126a

Browse files
authored
Removed system-owner-discovery.yaml from metadata.yaml (#1080)
* Updated the csp Signed-off-by: Tejas-24ytj <tblamkhade24@gmail.com> * Updated the csp Signed-off-by: Tejas-24ytj <tblamkhade24@gmail.com> * Changed policy action from block to audit in pren-test-recon Signed-off-by: Tejas-24ytj <tblamkhade24@gmail.com> * Changed policy action from block to audit in pren-test-recon Signed-off-by: Tejas-24ytj <tblamkhade24@gmail.com> * Removed system-owner-discovery from metadata.yaml Signed-off-by: Tejas-24ytj <tblamkhade24@gmail.com> --------- Signed-off-by: Tejas-24ytj <tblamkhade24@gmail.com>
1 parent c55f2b0 commit ade126a

File tree

1 file changed

+0
-16
lines changed

1 file changed

+0
-16
lines changed

generic/csp/metadata.yaml

Lines changed: 0 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -167,22 +167,6 @@ policyRules:
167167
including VNC to send the screen and control buffers and SSH for secure
168168
file transfer.
169169
yaml: remote-services.yaml
170-
- name: system-owner-discovery
171-
precondition:
172-
- OPTSCAN
173-
description:
174-
refs:
175-
- name: MITRE-TTP-T1082
176-
url:
177-
- https://attack.mitre.org/techniques/T1082/
178-
tldr: Limit adversaries from gathering system information
179-
detailed: An adversary may attempt to get detailed information about the
180-
operating system and hardware, including version, patches, hotfixes,
181-
service packs, and architecture. Adversaries may use the information
182-
from System Information Discovery during automated discovery to shape
183-
follow-on behaviors, including whether or not the adversary fully
184-
infects the target and/or attempts specific actions.
185-
yaml: system-owner-discovery.yaml
186170
- name: trusted-cert-mod
187171
precondition:
188172
- OPTSCAN

0 commit comments

Comments
 (0)