Adversaries may gather information about the victim's organization that can be used during targeting. Information about an organization may include a variety of details, including the names of divisions/departments, specifics of business operations, as well as the roles and responsibilities of key employees. [1]
| ID | Mitigation | Description |
|---|---|---|
| M2035 | Proper Information Classification and Flow-Down Guidelines | |
| M1017 | User Training |