{"description": "ICS techniques mitigated by Restrict File and Directory Permissions, ATT&CK mitigation M0922 (v1.0)", "name": "Restrict File and Directory Permissions (M0922)", "domain": "ics-attack", "versions": {"layer": "4.5", "attack": "17", "navigator": "5.1.0"}, "techniques": [{"techniqueID": "T0809", "comment": "Protect files stored locally with proper permissions  to limit opportunities for adversaries to impact data storage. (Citation: National Institute of Standards and Technology April 2013)\n", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T0811", "comment": "Protect files with proper permissions to limit opportunities for adversaries to interact and collect information from databases. (Citation: Keith Stouffer May 2015) (Citation: National Institute of Standards and Technology April 2013)\n", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T0893", "comment": "Protect files stored locally with proper permissions to limit opportunities for adversaries to interact and collect information from the local system. (Citation: Keith Stouffer May 2015) (Citation: National Institute of Standards and Technology April 2013)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T0872", "comment": "Protect files stored locally with proper permissions to limit opportunities for adversaries to remove indicators of their activity on the system. (Citation: Keith Stouffer May 2015) (Citation: National Institute of Standards and Technology April 2013)\n", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T0849", "comment": "Use file system access controls to protect system and application folders.\n", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T0873", "comment": "Ensure permissions restrict project file access to only engineer and technician user groups and accounts.\n", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T0881", "comment": "Ensure proper process and file permissions are in place to inhibit adversaries from disabling or interfering with critical services.\n", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T0882", "comment": "Protect files stored locally with proper permissions to limit opportunities for adversaries to interact and collect information from databases. (Citation: Keith Stouffer May 2015) (Citation: National Institute of Standards and Technology April 2013)\n", "score": 1, "color": "#66b1ff", "showSubtechniques": false}], "gradient": {"colors": ["#ffffff", "#66b1ff"], "minValue": 0, "maxValue": 1}, "legendItems": [{"label": "mitigated by Restrict File and Directory Permissions", "color": "#66b1ff"}]}