The title of this blog post may not be entirely correct, as it is difficult to compare vulnerability assessment with MITRE ATT&CK based gap assessment in objective measures. However, this post aims to evangelize the joint raison d’être of vulnerability assessment and adversarial technique/procedure-based gap assessment.
Most CISOs/CIOs are familiar with vulnerability assessment and its outcomes, but not everyone is familiar with the adversarial technique/procedure-based gap assessment. Therefore, let’s start with the latter.
Numerous cybersecurity assessment frameworks exist, but many of them are focused only on compliance or lack objectivity. The MITRE ATT&CK Framework is a widely accepted knowledge base that describes adversary tactics, techniques, and sub-techniques. Its latest version (v12) consists of 14 tactics, 193 techniques, and 401 sub-techniques and is considered the most pragmatic way to address infrastructure attacks today.
While having a plan for cybersecurity is essential, the input data used to make decisions is crucial. The results of a MITRE-based gap assessment provide a strategy that includes key performance indicators that must be addressed. It is similar to a vulnerability assessment and is also an operative task, but it is also tactical and strategic. It lays the foundation for defining annual technical KPIs and is the most objective viewpoint for determining what should be seen and what is not visible in terms of attack techniques.
The development of IT security detection capabilities based on this assessment can ensure a clean conscience even in case an attack. This is the most complicated thing for adversaries, as intelligence is not useful if it cannot be processed by the entity.
To make the assessment as usable as possible in real life, several aspects are to be considered when defining the scope of the assessment. A sector-specific threat intelligence report provides an actionable plan to mitigate white spots in the detection ecosystem of entities.
A sector-specific heatmap is required to pinpoint the most relevant incidents, and the search process is structured by setting up the scope of the search and then breaking it down. After reviewing the data and identifying specific malware and tools used in each cyber incident, the nature of the attack and campaign must be analyzed.
During the detection phase, a large set of sector-specific indicators can be gathered and shared with the community using the MISP threat intelligence platform. Sigma rules become the de facto standard for expressing SIEM queries, and they can be integrated into MISP events.
Building a playbook for all detections with RACI and implementing it into each entity’s incident response plan is one of the most important steps. Testing can be done using Red or Purple Teaming activities.
Updating the ATT&CK heatmap is challenging but worthwhile, as actors may change their behaviors and their TTPs may evolve over time. Updating can be supplemented with in-house or commercial threat intelligence solutions.
In conclusion, regular vulnerability testing is mandatory, but it provides only a snapshot reflection. Attack techniques are most constant, and the capability to detect them is currently the silver bullet. It can have many benefits to entrust a third party to conduct the assessment, such as knowledge of relevant procedures and not just techniques, conducting audits across industries, as well sampling data from many sources. Should the audit be conducted based only on techniques, it may result in a false sense of security.
Download our MITRE ATT&CK for Enterprise (v11) Gap Analysis Report to learn more!
Cookie disclaimer
Cookies are used on this website. Cookies are files that store identifying information on website visitors’ endpoint. In accordance with the provisions of Directive 2002/58/EC of the European Parliament and of the Council on the processing of personal data and the protection of privacy in the electronic communications sector, users are hereby informed in advance on the purposes of cookie usage. CustomizeAccept All
Manage consent
Privacy Overview
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Cookie
Duration
Description
cookielawinfo-checbox-analytics
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional
11 months
The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy
11 months
The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
_GRECAPTCHA
5 months 27 days
This cookie is set by Google. In addition to certain standard Google cookies, reCAPTCHA sets a necessary cookie (_GRECAPTCHA) when executed for the purpose of providing its risk analysis.
__cfruid
session
Cloudflare sets this cookie to identify trusted web traffic.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Cookie
Duration
Description
CONSENT
1 year
These cookies are set via embedded youtube-videos. They register anonymous statistical data on for example how many times the video is displayed and what settings are used for playback.No sensitive data is collected unless you log in to your google account, in that case your choices are linked with your account, for example if you click “like” on a video.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Cookie
Duration
Description
VISITOR_INFO1_LIVE
5 months 27 days
YSC
session
yt-remote-connected-devices
never
These cookies are set via embedded youtube-videos.
yt-remote-device-id
never
These cookies are set via embedded youtube-videos.