COMPLIANCE FRAMEWORK
The MITRE ATT&CK Framework
The MITRE ATT&CK framework has become the new standard for how the security world communicates about adversaries and techniques.
Get a DemoNot All Vulnerabilities Are Created Equal
What are the MITRE ATT&CK Framework Components?
This framework provides a knowledge base of adversarial techniques, classified by tactics (short term tactical attack goals) and techniques (how cybercriminals achieved specific tactics). Rather than focusing on abstract kill chains and tools, the MITRE framework focuses on how cybercriminals interact with systems during a security event. MITRE ATT&CK is structured this way for a few reasons:
Insight into Adversary Behavior
Standard indicators of compromise (domains, IP addresses, file hashes, registry keys, etc.) provided point-in-time detection, but do not map how cybercriminals interact with systems over time. MITRE ATT&CK changed this by looking at system interaction.
Mapping of Lifecycle Models
Many existing lifecycle and cyber kill chain concepts relied on abstraction, rather than concrete tactics, techniques, and procedures (TTPs). This was insufficient to address current and emerging security needs.
Common Taxonomy
There was not a common terminology to describe TTPs across adversary groups. The MITRE ATT&CK framework provides one.
IoT Device Security in 2024:
The High Cost of Doing Nothing
Protecting the growing IoT architecture
in a complicated security environment
Safe, Comprehensive, Categorized
How Asimily Supports the MITRE ATT&CK Framework
Asimily analyzes every vulnerability and determines how it can be exploited using public research and its own capabilities. Starting with passively gathered network data, Asimily uses the MITRE ATT&CK framework to detect different attack techniques. Asimily also maps out the attack journey in order to understand how it could detect a given exploit attempt based on the ATT&CK techniques it detects.
Automated Analysis Backed by Humans
Asimily analyzes each vulnerability in a customer’s IoT fleet for how the vulnerability can be exploited. That includes the dependencies, pre-conditions, and other requirements for success. This base information – derived from Asimily’s patented techniques for automated analysis of diverse, unstructured information about devices and vulnerabilities is the start. It is then verified by Asimily security experts to get an accurate view of how the vulnerability can be mitigated.
Prioritize Vulnerabilities
Asimily identifies where exploitable vulnerabilities are in their environment. For each specific device, data is enriched with MDS2s and SBOMs information. Then, you can prioritize your efforts to address the real risks to your network and not just the published list of potential threats.
Breaking the Attack Chain
With this detailed and contextual information about vulnerabilities, the attack process, and the customer’s IoT deployment, a recommendation can be given. Asimily selects the simplest, least time-consuming method for breaking attack via one of the ATT&CK Framework’s codified steps. This respects security teams’ chronic shortage of time and resources, which forces them to reduce risk fast and efficiently.
What is the MITRE ATT&CK Framework
MITRE, the nonprofit responsible for the Framework, defines tactics as the underlying reason that attackers perform actions. The Framework starts by identifying critical tactics for enterprise systems and also drills down into Mobile and Industrial Control Systems (ICS). While some primary tactics follow across all three environments, some are unique to Mobile or ICS.
Dive DeeperAsimily Enables Cybersecurity Compliance
Cybersecurity compliance and security are iterative processes. With Asimily, organizations can identify KPIs and then track trends over time for visibility into their security posture. Further, senior leadership and the board of directors need visibility into risk to fulfill their governance duties.
Discover How