- AR5
- -AF024
- -AF024.001
Account Obfuscation - AR5
Contributor: Ryan Bellows @ Information Security Analyst - Subsection AF024.001
- AR5
- -AF024
- -AF024.002
Unauthorized Credential Use - AR5
Contributor: Ryan Bellows @ Information Security Analyst - Subsection AF024.002
- AR2
- -ME001
- -ME001.001
Access to Asset Past Termination - AR2
Contributor: Ryan Bellows @ Information Security Analyst - Subsection ME001.001
- AR2
- -ME001
- -ME001.002
Purchase and Use of Unmanaged Corporate Hardware - AR2
Contributor: Ryan Bellows @ Information Security Analyst - Subsection ME001.002
- AR5
- -AF029
- -AF029.002
Unauthorized VPN Usage - AR5
Contributor: Ryan Bellows @ Information Security Analyst - Subsection AF029.002
- AR5
- -AF029
- -AF029.003
Use of Browser-Based VPN Extensions - AR5
Contributor: Ryan Bellows @ Information Security Analyst - Subsection AF029.003
- AR5
- -AF029
- -AF029.004
Switching to Unmonitored Networks - AR5
Contributor: Ryan Bellows @ Information Security Analyst - Subsection AF029.004
- Preventions
- -PV059
Insider-Focused Threat Intelligence - PV059
Contributor: Ryan Bellows @ Information Security Analyst - Prevention PV059
- Preventions
- -PV072
Endpoint Network Access Agent Enforcement - PV072
Contributor: Ryan Bellows @ Information Security Analyst - Prevention PV072
- Detections
- -DT125
Threat Intelligence Feeds for Insider Threat Indicators - DT125
Contributor: Ryan Bellows @ Information Security Analyst - Detection DT125