Attackers may compromise a subsidiary organization before moving into the parent organization.

Third parties may need access to data on your network. Your team should have an idea of what type of data they need and where that data is located. Access control should be put in place to limit the third party.

Malware/Threat actors

Preventions

<Mitigation techniques>

Detections

  • Monitor the network mechanism between you and the third party for malicious activity. Make a detection ruleset of tuples(IP address, protocol, port) to detect if a connection does not follow these rules.

Toolkit

<Toolkit instructions, if applicable>

Similar techniques

References