WP CISO Guide MITRE-ATTACK v2
WP CISO Guide MITRE-ATTACK v2
WP CISO Guide MITRE-ATTACK v2
to MITRE ATT&CK™
White Paper | A CISO’S Guide to MITRE ATT&CK
Contents
Notice........................................................................................................... 3
What is MITRE ATT&CK™?............................................................................. 4
Why is the MITRE ATT&CK Framework Important?........................................ 5
MITRE ATT&CK Provides a Common Language............................................. 5
How is MITRE ATT&CK Structured?............................................................... 5
What are ATT&CK Groups and How Can They Help?....................................... 5
How Do You Get Started with MITRE ATT&CK?.............................................. 6
Understanding MITRE ATT&CK Use Cases..................................................... 6
Red Team Performance 7
Blue Team Performance 7
Threat Intelligence 7
Security Control Analysis and Selection 7
Breach and Attack Simulation (BAS) 7
Summary....................................................................................................... 8
Notice
AttackIQ® publications are made available solely for general information purposes. The information
contained in this publication is provided on an “as is” basis. Any additional developments or research
since the date of publication will not be reflected in this report.
Today, the MITRE ATT&CK framework is the most authoritative, comprehensive, and complete
set of up-to-date attack techniques and supporting tactics in the world. MITRE ATT&CK is a
globally-accessible knowledge base of adversary tactics and techniques based on real-world
data. The ATT&CK knowledge base is used as a foundation for the development of specific
threat models and methodologies in the private sector, in government, and in the cybersecurity
product and service community. MITRE’s stature in the cyber community and the independence
of its intellectual property in the ATT&CK matrix make it the ideal platform from which security
operations management, executive staff, and boards of directors can objectively evaluate and
measure cybersecurity controls’ performance, risk, and capability.
The MITRE ATT&CK framework is not the only cybersecurity framework that can help you defend
your enterprise. It is complemented by other important frameworks such as COBIT (Isaca.org),
Lockheed Martin’s Cyber Kill Chain®, ISO/IEC 27001, and the NIST cybersecurity framework. All
of these can be an important part of your cyberdefense strategy.
MITRE ATT&CK is perhaps the largest, most in-depth, organized, and strongly supported knowledge
base of adversarial behavior. You can review your security controls and gain visibility into gaps in your
defenses. Security management can rapidly and easily identify critical problems for remediation. This
objective assessment provides a data-driven approach to prioritizing and scaling your cybersecurity
program and budget.
A tactic clearly defines the goals of the attacker. A technique provides a description of the different
ways that a cyber attacker can achieve the end goals of the tactic.
Here is an example of an ATT&CK group Carbanak that mainly targets banks and the various aliases by
which it is known. Carbanak is also sometimes referred to as FIN7, but these appear to be two groups
using the same Carbanak malware and so they are tracked separately.
Anunak
Carbon Spider
Analytically, you can identify gaps against the threats you expect in your environment, determine the
risk these gaps provide, and make prioritized decisions to enhance your defenses. This will enable you
to have a better discussion with management over budgets and attendant risk.
Threat Intelligence
MITRE ATT&CK can be used to more rapidly and effectively integrate your threat intelligence into
your cyberdefense operations. Threats can be mapped to the specific techniques of the attackers to
understand if gaps exist, determine risk, and develop and deploy a plan to address them. This helps you
answer specific questions about these new or predicted threats such as: “Do we think we are protected
against APT23?”
AttackIQ BAS technology leverages MITRE ATT&CK to allow any enterprise to automatically simulate
the full attack and expanded kill chain against enterprise infrastructure using software agents, virtual
machines, and other means. AttackIQ BAS delivers continuous validation of your enterprise security
program. You can find the performance gaps, strengthen your security posture, and improve your
incident response capabilities. Breach and Attack Simulation assesses readiness and validates that
your enterprise security systems are performing as originally intended.
The average large enterprise has deployed over 75 security control tools, often with significant overlap
and redundancy. For most of these enterprises, it is unclear how well these security controls really
work and what areas and gaps require additional investment. AttackIQ BAS helps you develop a smart
strategy, validates that you have a resilient security control architecture, and objectively supports your
budgeting decisions.
Often existing security controls are not configured correctly or integrated properly with the security
ecosystem. BAS platforms can identify potentially costly misconfigurations that will be found and
targeted by malicious actors. In any scenario, your cyberdefense will not work if the security controls do
not perform as you expect.
AttackIQ BAS brings scale and flexibility for the largest enterprise. AttackIQ automation enables the
platform to work autonomously and to scale to support the largest global enterprise. This includes
support for live production environments - even the small changes to configurations or administration
can open new vulnerabilities in your cyberdefense. This helps identify and close the ever-present
gap between test environments and live production environments that, undetected, will ultimately
compromise the entire organization.
Summary
MITRE ATT&CK brings structure and organization to the understanding of adversarial behavior and
provides a detailed knowledge base of actual cyber attack tactics, techniques, and procedures. MITRE
ATT&CK provides a common language to categorize attackers and their specific behavior in an easily
understood way. This allows cyber defenders to better prepare against likely attacks, analyze attacks
more quickly, and work more efficiently.
Breach and Attack Simulation is a powerful and compelling use case for MITRE ATT&CK. To find out
more about how to operationalize MITRE ATT&CK using AttackIQ Breach and Attack Simulation, please
reach out to info@attackiq.com or visit us at www.attackiq.com.
AttackIQ, a leader in the emerging market of breach and attack simulation, built the industry’s first platform that enables red and blue teams
to test and measure the effectiveness of their security controls and staff. An open platform, AttackIQ® supports the MITRE ATT&CK Matrix,
U.S. Headquarters
a curated knowledge base and model for cyber adversary behavior used for planning security improvements and verifying that defenses
9276 Scranton Road, Suite 100
work as expected. AttackIQ’s platform is trusted by leading companies around the world. For more information visit www.attackiq.com.
San Diego, CA 92121 Follow AttackIQ on Twitter, Facebook, LinkedIn, and YouTube.
+1 (888) 588-9116
© 2019 AttackIQ, Inc. All rights reserved. AttackIQ® is a registered trademark of AttackIQ, Inc. MITRE ATT&CK™ (and MITRE ATTACK™) are trademarks of The
info@attackiq.com
Mitre Corporation.