Esc
Network Traffic Policy Mapping
Definition
Network traffic policy mapping identifies and models the allowed pathways of data at the network, transport, and/or application levels.
Synonyms: IPS Policy Mapping, Web Security Gateway Policy Mapping, Firewall Mapping, DLP Policy Mapping.Artifact Relationships:
This defensive technique is related to specific artifacts. Click the artifact node for more information.
Related ATT&CK Techniques:
These mappings are inferred, experimental, and will improve as the
knowledge graph grows.
These offensive techniques are determined related because of the way this defensive technique,, , and .
Privilege Escalation
Abuse Elevation Control Mechanism
Access Token Manipulation
Domain or Tenant Policy Modification
Discovery
Group Policy Discovery
Credential Access
Modify Authentication Process
Unsecured Credentials
Defense Evasion
Abuse Elevation Control Mechanism
Access Token Manipulation
Modify Authentication Process
File and Directory Permissions Modification
Domain or Tenant Policy Modification
References
All
User Manual
The following references were used to develop the Network Traffic Policy Mapping knowledge-base article.
(Note: the consideration of references does not imply specific functionality exists in an offering.)
Cisco ASR 9000 Series Aggregation Services Routers - Access List Commands
Reference Type: User Manual Organization: Cisco