Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique.
ID | Mitigation | Description |
---|---|---|
M2067 | Authentication combined with means to ensure the identity of the other party using certificates or pre-shared keys |