Execution Isolation - Technique D3-EI | MITRE D3FEND™
Esc
Execution Isolation
D3-EI
D3-EI (Execution Isolation)
Definition
Execution Isolation techniques prevent application processes from accessing non-essential system resources, such as memory, devices, or files.
Artifact Relationships:
This defensive technique is related to specific artifacts. Click the artifact node for
more information.
json
Technique Subclasses
There are 6 techniques in this category,
Execution Isolation
Name
ID
Definition
Synonyms
Execution Isolation
D3-EI
Execution Isolation techniques prevent application processes from accessing non-essential system resources, such as memory, devices, or files.
Kernel-based Process Isolation
D3-KBPI
Using kernel-level capabilities to isolate processes.
Executable Allowlisting
D3-EAL
Using a digital signature to authenticate a file before opening.
File Signature Authentication
Executable Denylisting
D3-EDL
Blocking the execution of files on a host in accordance with defined application policy rules.
Executable Blacklisting
Hardware-based Process Isolation
D3-HBPI
Preventing one process from writing to the memory space of another process through hardware based address manager implementations.
Virtualization
Application-based Process Isolation
D3-ABPI
Application code which prevents its own subroutines from accessing intra-process / internal memory space.
Sandbox
Remote Browser Isolation
, and
Browser-based Process Isolation
Related ATT&CK Techniques:
These mappings are inferred, experimental, and will improve as the
knowledge graph grows.
These offensive techniques are determined related because of the way
this defensive technique,
, and
Lateral Movement
Use Alternate Authentication Material
Privilege Escalation
Abuse Elevation Control Mechanism
Bypass User Account Control
Access Token Manipulation
Parent PID Spoofing
Event Triggered Execution
Screensaver
Netsh Helper DLL
Component Object Model Hijacking
AppInit DLLs
LC_LOAD_DYLIB Addition
Accessibility Features
PowerShell Profile
Trap
AppCert DLLs
Process Injection
Thread Execution Hijacking
Asynchronous Procedure Call
Process Doppelgänging
Scheduled Task/Job
Scheduled Task
Hijack Execution Flow
Path Interception by Unquoted Path
Path Interception by PATH Environment Variable
Path Interception by Search Order Hijacking
Boot or Logon Autostart Execution
Shortcut Modification
Registry Run Keys / Startup Folder
Boot or Logon Initialization Scripts
RC Scripts
Login Hook
Network Logon Script
Logon Script (Windows)
Impact
Data Manipulation
Runtime Data Manipulation
Discovery
System Network Configuration Discovery
Application Window Discovery
System Service Discovery
System Information Discovery
Remote System Discovery
System Owner/User Discovery
System Time Discovery
Process Discovery
Persistence
Office Application Startup
Office Template Macros
Event Triggered Execution
Screensaver
Netsh Helper DLL
Component Object Model Hijacking
AppInit DLLs
LC_LOAD_DYLIB Addition
Accessibility Features
PowerShell Profile
Trap
AppCert DLLs
Server Software Component
Transport Agent
Web Shell
SQL Stored Procedures
Scheduled Task/Job
Scheduled Task
Hijack Execution Flow
Path Interception by Unquoted Path
Path Interception by PATH Environment Variable
Path Interception by Search Order Hijacking
Boot or Logon Autostart Execution
Shortcut Modification
Registry Run Keys / Startup Folder
Modify Authentication Process
Boot or Logon Initialization Scripts
RC Scripts
Login Hook
Network Logon Script
Logon Script (Windows)
Execution
User Execution
Malicious File
Command and Scripting Interpreter
Windows Management Instrumentation
Scheduled Task/Job
Scheduled Task
Credential Access
Exploitation for Credential Access
OS Credential Dumping
LSASS Memory
LSA Secrets
Security Account Manager
Multi-Factor Authentication Request Generation
Modify Authentication Process
Defense Evasion
Abuse Elevation Control Mechanism
Bypass User Account Control
System Binary Proxy Execution
Control Panel
Compiled HTML File
Mshta
Rundll32
CMSTP
Access Token Manipulation
Parent PID Spoofing
Obfuscated Files or Information
Compile After Delivery
Software Packing
Binary Padding
Use Alternate Authentication Material
Deobfuscate/Decode Files or Information
Process Injection
Thread Execution Hijacking
Asynchronous Procedure Call
Process Doppelgänging
Impair Defenses
Impair Command History Logging
Disable or Modify Tools
Hijack Execution Flow
Path Interception by Unquoted Path
Path Interception by PATH Environment Variable
Path Interception by Search Order Hijacking
Masquerading
Invalid Code Signature
Rename Legitimate Utilities
Modify Authentication Process
XSL Script Processing
D3FEND
A knowledge
graph
of cybersecurity countermeasures
1.4.0
Model
Model
Asset Inventory
Asset Vulnerability Enumeration
Container Image Analysis
Configuration Inventory
Data Inventory
Hardware Component Inventory
Network Node Inventory
Software Inventory
Network Mapping
Logical Link Mapping
Active Logical Link Mapping
Passive Logical Link Mapping
Network Traffic Policy Mapping
Network Vulnerability Assessment
Physical Link Mapping
Active Physical Link Mapping
Direct Physical Link Mapping
Operational Activity Mapping
Access Modeling
Operational Dependency Mapping
Operational Risk Assessment
Organization Mapping
System Mapping
Data Exchange Mapping
Service Dependency Mapping
System Dependency Mapping
System Vulnerability Assessment
Harden
Harden
Agent Authentication
Biometric Authentication
Certificate-based Authentication
Multi-factor Authentication
Password Authentication
Token-based Authentication
Application Hardening
Application Configuration Hardening
Disable Remote Access
Control Flow Integrity
Dead Code Elimination
Exception Handler Pointer Validation
Pointer Authentication
Process Segment Execution Prevention
Segment Address Offset Randomization
Stack Frame Canary Validation
Credential Hardening
Certificate Pinning
Credential Rotation
Certificate Rotation
Password Rotation
One-time Password
Strong Password Policy
Change Default Password
Token Binding
Message Hardening
Message Authentication
Bus Message Authentication
Message Encryption
Transfer Agent Authentication
Platform Hardening
Bootloader Authentication
Disk Encryption
Driver Load Integrity Checking
File Encryption
Hardware-based Write Protection
Physical Enclosure Hardening
Radiation Hardening
Electromagnetic Radiation Hardening
RF Shielding
Particle Radiation Hardening
Software Update
System Configuration Permissions
TPM Boot Integrity
Source Code Hardening
Credential Scrubbing
Domain Logic Validation
Operational Logic Validation
Integer Range Validation
Pointer Validation
Memory Block Start Validation
Null Pointer Checking
Reference Nullification
Trusted Library
Variable Initialization
Variable Type Validation
Detect
Detect
File Analysis
Dynamic Analysis
Emulated File Analysis
File Content Analysis
File Content Rules
File Hashing
Identifier Analysis
Homoglyph Detection
Identifier Activity Analysis
Identifier Reputation Analysis
Domain Name Reputation Analysis
File Hash Reputation Analysis
IP Reputation Analysis
URL Reputation Analysis
URL Analysis
Message Analysis
Sender MTA Reputation Analysis
Sender Reputation Analysis
Network Traffic Analysis
Administrative Network Activity Analysis
Application Protocol Command Analysis
Remote Firmware Update Monitoring
Byte Sequence Emulation
Certificate Analysis
Active Certificate Analysis
Passive Certificate Analysis
Client-server Payload Profiling
Connection Attempt Analysis
DNS Traffic Analysis
File Carving
Inbound Session Volume Analysis
IPC Traffic Analysis
Network Traffic Community Deviation
Network Traffic Signature Analysis
Per Host Download-Upload Ratio Analysis
Protocol Metadata Anomaly Detection
Relay Pattern Analysis
Remote Terminal Session Detection
RPC Traffic Analysis
Physical Access Monitoring
Electronic Lock Monitoring
Motion Sensor Monitoring
Proximity Sensor Monitoring
Video Surveillance
Platform Monitoring
Application Performance Monitoring
Application Exception Monitoring
File Integrity Monitoring
Firmware Behavior Analysis
Firmware Embedded Monitoring Code
Firmware Verification
Peripheral Firmware Verification
System Firmware Verification
Operating Mode Monitoring
Operating System Monitoring
Endpoint Health Beacon
Input Device Analysis
Memory Boundary Tracking
Scheduled Job Analysis
System Daemon Monitoring
System File Analysis
Service Binary Verification
System Init Config Analysis
User Session Init Config Analysis
Operational Process Monitoring
Platform Uptime Monitoring
Process Analysis
Database Query String Analysis
File Access Pattern Analysis
Indirect Branch Call Analysis
Process Code Segment Verification
Process Self-Modification Detection
Process Spawn Analysis
Process Lineage Analysis
Script Execution Analysis
Shadow Stack Comparisons
System Call Analysis
File Creation Analysis
User Behavior Analysis
Authentication Event Thresholding
Authorization Event Thresholding
Credential Compromise Scope Analysis
Domain Account Monitoring
Job Function Access Pattern Analysis
Local Account Monitoring
Resource Access Pattern Analysis
Session Duration Analysis
User Data Transfer Analysis
User Geolocation Logon Pattern Analysis
Web Session Activity Analysis
Isolate
Isolate
Access Mediation
Credential Transmission Scoping
IO Port Restriction
Network Access Mediation
LAN Access Mediation
Routing Access Mediation
Network Resource Access Mediation
Remote File Access Mediation
Web Session Access Mediation
Endpoint-based Web Server Access Mediation
Proxy-based Web Server Access Mediation
Operating Mode Restriction
OT Variable Access Restriction
Physical Access Mediation
Physical Locking
System Call Filtering
Local File Access Mediation
Access Policy Administration
Domain Trust Policy
Local File Permissions
User Account Permissions
User Group Permissions
Content Filtering
Content Modification
Content Excision
Content Format Conversion
Content Rebuild
Content Substitution
Content Quarantine
Content Validation
File Format Verification
File Content Decompression Checking
File Internal Structure Verification
File Metadata Consistency Validation
File Metadata Value Verification
File Magic Byte Verification
Execution Isolation
Application-based Process Isolation
Executable Allowlisting
Executable Denylisting
Hardware-based Process Isolation
Kernel-based Process Isolation
Network Isolation
Broadcast Domain Isolation
Directional Network Link
DNS Allowlisting
DNS Denylisting
Forward Resolution Domain Denylisting
Hierarchical Domain Denylisting
Homoglyph Denylisting
Forward Resolution IP Denylisting
Reverse Resolution IP Denylisting
Encrypted Tunnels
Network Traffic Filtering
Inbound Traffic Filtering
Email Filtering
Outbound Traffic Filtering
Deceive
Deceive
Decoy Environment
Connected Honeynet
Integrated Honeynet
Standalone Honeynet
Decoy Object
Decoy File
Decoy Network Resource
Decoy Persona
Decoy Public Release
Decoy Session Token
Decoy User Credential
Evict
Evict
Credential Eviction
Account Locking
Authentication Cache Invalidation
Credential Revocation
Object Eviction
Disk Formatting
Disk Erasure
Disk Partitioning
DNS Cache Eviction
Domain Registration Takedown
File Eviction
Email Removal
Registry Key Deletion
Process Eviction
Host Shutdown
Host Reboot
Process Suspension
Process Termination
Session Termination
Restore
Restore
Restore Access
Reissue Credential
Restore Network Access
Restore User Account Access
Unlock Account
Restore Object
Restore Configuration
Restore Database
Restore Disk Image
Restore File
Restore Email
Restore Software