MITRE ATT&CK® Framework
The MITRE ATT&CK® framework is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations. It has systemized the tactics and techniques of adversaries, providing a common taxonomy and reference framework of the cyber-attack kill chain. The ATT&CK knowledge base is used extensively by Cymulate to create meaningful and life-like attack scenarios for its customers to challenge, assess and optimize their security controls, in the production environment.
14 Tactics of the ATT&CK Framework
realized with many techniques and sub-techniques, too many to list here. Furthermore, the implementation
of an individual technique can have thousands of variations. For example, to validate email security against
spear phishing emails, just one ATT&CK technique, thousands of emails with different attachments and
payloads must be created to find the ones that can get in undetected by the email security controls.
gathering information that can be used to support targeting.
Development
compromising/stealing resources that can be used to support targeting.
initial foothold within a network.
running on a local or remote system.
changed credentials, and other interruptions that could cut off their access.
Escalation
permissions on a system or network.
Evasion
throughout their compromise.
Access
names and passwords.
about the system and internal network.
Movement
systems on a network.
and Control
systems under their control within a victim network.
integrity by manipulating business and operational processes.
Mapping Vectors to MITRE ATT&CK Tactics
security layers of an enterprise architecture against real world attack scenario, we operationalize ATT&CK tactics and
techniques to attack vectors. The result is that Cymulate attack vectors implement multiple tactics and the same tactics
are implemented in multiple vectors, just as they would appear in actual attack scenarios. For example, the Recon vector
operationalizes techniques found in both the Reconnaissance & Resource Development tactics, and techniques used in
Lateral Movement are implemented in both the Endpoint and Lateral Movement vectors. We decouple endpoint security
validation from infrastructure resilience to enable our customers to assess and optimize each layer independently to the
various techniques used by threat actors to move laterally in an organizations network.
Operationalize threat intelligence
& the MITRE ATT&CK framework
MITRE ATT&CK
Implementation
Threat Intelligence
Assessments
Custom
Scenarios
Security
Infrastructure
SOAR
Findings
via API
Portal
IoCs and IoBs
Mitigations Guidance
IoCs and IoBs
Mitigations Guidance
SOAR
Findings
via API
Portal
Mapping the Results
The MITRE ATT&CK® framework has advanced the cyber security industry providing both a comprehensive knowledge base but with a common taxonomy and reference framework of the cyber-attack kill chain.
The framework enables security practitioners, ethical hackers, vendors and service providers to share a common language when describing attacks, security gaps and infrastructure weaknesses.
Cymulate shares this approach with the industry by mapping individual assessments and results to the framework.
Aggregated results provide a heat map that identifies the systematic strengths and weaknesses of a security architecture.