- AR3
- -PR017
- -PR017.001
Archive via Utility - AR3
Contributor: The ITM Team @ - Subsection PR017.001
- AR3
- -PR017
- -PR017.002
Archive via Library - AR3
Contributor: The ITM Team @ - Subsection PR017.002
- AR3
- -PR017
- -PR017.003
Archive via Compression - AR3
Contributor: The ITM Team @ - Subsection PR017.003
- AR3
- -PR017
- -PR017.004
Archive via Encryption - AR3
Contributor: The ITM Team @ - Subsection PR017.004
- AR4
- -IF010
- -IF010.001
Exfiltration via Corporate Email - AR4
Contributor: The ITM Team @ - Subsection IF010.001
- AR4
- -IF010
- -IF010.002
Exfiltration via Personal Email - AR4
Contributor: The ITM Team @ - Subsection IF010.002
- AR4
- -IF011
- -IF011.001
Intentionally Weakening Network Security Controls For a Third Party - AR4
Contributor: The ITM Team @ - Subsection IF011.001
- AR4
- -IF011
- -IF011.002
Intentionally Weakening Physical Security Controls For a Third Party - AR4
Contributor: The ITM Team @ - Subsection IF011.002
- AR4
- -IF002
- -IF002.005
Exfiltration via Physical Documents - AR4
Contributor: The ITM Team @ - Subsection IF002.005
- AR3
- -PR010
- -PR010.001
Managerial Approval - AR3
Contributor: The ITM Team @ - Subsection PR010.001