D3-MH   Message Hardening  Email or Messaging Hardening includes measures taken to ensure the confidentiality and integrity of user to user computer messages.  
                                                    
                                                    
                                                         D3-MAN   Message Authentication  Authenticating the sender of a message and ensuring message integrity.    
                                                        
                                                    
                                                    
                                                         D3-MENCR   Message Encryption  Encrypting a message body using a cryptographic key.    
                                                        
                                                    
                                                    
                                                         D3-TAAN   Transfer Agent Authentication  Validating that server components of a messaging infrastructure are authorized to send a particular message.    
                                                        
                                                    
                                                
                                                    
                                                         D3-CH   Credential Hardening  Credential Hardening techniques modify system or network properties in order to protect system or network/domain credentials.  
                                                    
                                                    
                                                         D3-BAN   Biometric Authentication  Using biological measures in order to authenticate a user.    
                                                        
                                                    
                                                    
                                                         D3-CBAN   Certificate-based Authentication  Requiring a digital certificate in order to authenticate a user.    
                                                        
                                                    
                                                    
                                                         D3-CP   Certificate Pinning  Persisting either a server's X509 certificate or their public key and comparing that to server's presented identity to allow for greater client confidence in the remote server's identity for SSL connections.    
                                                        
                                                    
                                                    
                                                         D3-CTS   Credential Transmission Scoping  Limiting the transmission of a credential to a scoped set of relying parties.    
                                                        
                                                    
                                                    
                                                         D3-DTP   Domain Trust Policy  Restricting inter-domain trust by modifying domain configuration.    
                                                        
                                                    
                                                    
                                                         D3-MFA   Multi-factor Authentication  Requiring proof of two or more pieces of evidence in order to authenticate a user.    
                                                        
                                                    
                                                    
                                                         D3-OTP   One-time Password  A one-time password is valid for only one user authentication.    
                                                        
                                                    
                                                    
                                                         D3-SPP   Strong Password Policy  Modifying system configuration to increase password strength.    
                                                        
                                                    
                                                    
                                                         D3-UAP   User Account Permissions  Restricting a user account's access to resources.    
                                                        
                                                    
                                                    
                                                         D3-CRO   Credential Rotation  Expiring an existing set of credentials and reissuing a new valid set    
                                                        
                                                    
                                                
                                                    
                                                         D3-PH   Platform Hardening  Hardening components of a Platform with the intention of making them more difficult to exploit. Platforms includes components such as: * BIOS UEFI Subsystems * Hardware security devices such as Trusted Platform Modules * Boot process logic or code * Kernel software components  
                                                    
                                                    
                                                         D3-BA   Bootloader Authentication  Cryptographically authenticating the bootloader software before system boot.    
                                                        
                                                    
                                                    
                                                         D3-DENCR   Disk Encryption  Encrypting a hard disk partition to prevent cleartext access to a file system.    
                                                        
                                                    
                                                    
                                                         D3-DLIC   Driver Load Integrity Checking  Ensuring the integrity of drivers loaded during initialization of the operating system.    
                                                        
                                                    
                                                    
                                                         D3-FE   File Encryption  Encrypting a file using a cryptographic key.    
                                                        
                                                    
                                                    
                                                         D3-LFP   Local File Permissions  Restricting access to a local file by configuring operating system functionality.    
                                                        
                                                    
                                                    
                                                         D3-RFS   RF Shielding  Adding physical barriers to a platform to prevent undesired radio interference.    
                                                        
                                                    
                                                    
                                                         D3-SU   Software Update  Replacing old software on a computer system component.    
                                                        
                                                    
                                                    
                                                         D3-SCP   System Configuration Permissions  Restricting system configuration modifications to a specific user or group of users.    
                                                        
                                                    
                                                    
                                                         D3-TBI   TPM Boot Integrity  Assuring the integrity of a platform by demonstrating that the boot process starts from a trusted combination of hardware and software and continues until the operating system has fully booted and applications are running.  Sometimes called Static Root of Trust Measurement (STRM).    
                                                        
                                                    
                                                
                                                    
                                                         D3-AH   Application Hardening  Application Hardening makes an executable application more resilient to a class of exploits which either introduce new code or execute unwanted existing code. These techniques may be applied at compile-time or on an application binary.  
                                                    
                                                    
                                                         D3-ACH   Application Configuration Hardening  Modifying an application's configuration to reduce its attack surface.    
                                                        
                                                    
                                                    
                                                         D3-DCE   Dead Code Elimination  Removing unreachable or "dead code" from compiled source code.    
                                                        
                                                    
                                                    
                                                         D3-EHPV   Exception Handler Pointer Validation  Validates that a referenced exception handler pointer is a valid exception handler.    
                                                        
                                                    
                                                    
                                                         D3-PAN   Pointer Authentication  Comparing the cryptographic hash or derivative of a pointer's value to an expected value.    
                                                        
                                                    
                                                    
                                                         D3-PSEP   Process Segment Execution Prevention  Preventing execution of any address in a memory region other than the code segment.    
                                                        
                                                    
                                                    
                                                         D3-SAOR   Segment Address Offset Randomization  Randomizing the base (start) address of one or more segments of memory during the initialization of a process.    
                                                        
                                                    
                                                    
                                                         D3-SFCV   Stack Frame Canary Validation  Comparing a value stored in a stack frame with a known good value in order to prevent or detect a memory segment overwrite.