Introduction: Bringing ATT&CK® into the SOC
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
Already have an account? Sign In »
3 hours 16 minutes
welcome to the attack based stock assessments training course within the Minor Attack Defender program. My name is Andy Applebaum, and I'm going to be your instructor for this course.
To introduce this course, we're going to talk about how you can bring attack into the sock.
Many organizations have some kind of enterprise network performing an operational or business need, as well as a security operation center or sock that's protecting that network.
Additionally, a lot of socks and organizations as a home have noticed the attack framework is this useful framework that they can use to try to adopt a threatened form defense.
Unfortunately, it's not always exactly clear how an organization can look to and use the attack framework and really adopt it into their day to day operations.
To try to solve this, we developed a methodology to conduct what we call attack based stock assessments.
Where, and we have an assessment team analyze a target stock environment
to try to come up with a detection heat map that shows where the socks, strengths and weaknesses lie.
this course is designed to show you how to get that detection heat map from looking at the sock as well as the attack framework itself.
Walking away from the course, you should know how to look at your sock and what you should look for, how to map things in your sock to attack and how to recommend changes to align with the attack framework.
We assume from a knowledge perspective that you walk into this course with a good understanding of the attack framework itself, as well as some knowledge on how to use the attack navigator.
We also note that this course is designed from really a generic point of view, where you should be able to use these lessons regardless of where you sit within a sock, as well as if you're using this course as a learning path towards conducting a third party attack based stock assessment.
This course has five primary learning objectives.
After the course, you should number one know how sock technologies can map to the attack framework.
Number two. You should know how to walk through an attack based stock assessment.
You should also walk away knowing how to interview sock personnel about the attack framework with regards to how it fits into their operations,
and number four you should be able to effectively communicate findings using attack.
after this course, you should understand how to recommend changes to align with the
with the attack framework.
This course is laid out into three modules
and the first module. We're going to present an overview of attack based stock assessments walking through why you should conduct an attack based stock assessment, a methodology for assessments and then how to frame and scope and assessment
and module to. We're going to cover how to do the technical analysis of analyzing sock components with the attack framework.
Here we'll cover how to set a coverage rubric,
how to work with data sources, how to analyze analytics and then how to dive deep into tooling to understand how tools map back to the attack framework
and then the last module, we'll we'll put it all together and synthesize attack based stock assessments.
Here we'll cover how to interview staff, communicate with attack,
combine a final heat map and then propose recommendations.
Well now shift gears and dive into Module one and present an overview of attack based stock assessments.
This module has five primary learning objectives.
Number one After the module you should understand the importance and types of sock assessments.
You should also know the general methodology of how to conduct an attack based stock assessment.
Additionally, you should walk away knowing how to determine if an attack based stock assessment is appropriate for a given stock.
You should also be able to properly message an attack based stock assessment for a sock that's considering running one. And then, lastly, you should walk away knowing how to properly scope an assessment around the attack framework.
Well, now dive into Lesson one within module one on why we should conduct attack based stock assessments.
Oftentimes, we like to present this slide where we cover the core attack use cases when we're discussing attack
here we talk about detection, threaten intelligence, adversary emulation and, of course, assessments and engineering.
Diving deeper into assessments, a big part and the reason why we want to run an assessment so that we can understand our detection gaps
here. What we're going to do is take the attack framework and color coded based on some sort of measure of our ability to detect or mitigate the techniques in the framework.
In this example, we've used green to highlight techniques. We have high confidence. We could detect yellow to highlight techniques. We have some confidence we could detect and then low to highlight those techniques. We have low confidence we would be able to detect,
and there's a lot of reasons why we want to do this.
Understanding where our gaps are and really knowledge of your detection gaps
affords you a lot of things that you can do to better your socks.
Number one. It allows you to communicate your capabilities with a common reference always going back to your heat map of where your current coverages.
You can also use a heat map like this to inform your tooling purchases for the biggest return on investment, making sure you're buying a tool that remediated gaps, as opposed to buying a tool that
can potentially detect things you're already detecting.
You can also use this kind of heat map to identify data sources that you need for more enhanced detection and building on that to develop analytics to target the highest impact threats, referring back to where your gaps are to identify what those high impact threats might be
Now, when it comes to identifying detection gaps, there's two primary ways to do so.
The first is something that's hands on. This is something like penetration testing, red teaming adversary emulation. Here, you want to execute the techniques in your environment and then record. If you detect them or not,
the other approaches. Hands off. There's no execution here, just overview and analysis.
Here you look at your tools, the processes, procedures, the analytics, everything that you're running in a way that's only hands off, and you map each to the attack framework.
A hands on approach is really great because it gives you pinpoint accuracy by executing a technique and observing. If you if you actually detected it, you get some very good confidence on well, whether or not you can detect the technique,
however, it is often time consuming as well as invasive when running a hands on assessment.
Hands off assessment is great because it is minimally invasive. You don't actually interface with any systems. You're only analyzing things.
However, this comes at the cost of accuracy were really you're only able to get some approximate coverage.
One of the things in the middle of the road with a hands off assessment is that you often get a variable time investment.
It's not always as time consuming as a hands on assessment, but it really depends on how you want to scope the assessment that you're running.
Generally speaking, you should use a hands on assessment if you're running a smaller scoped exercise and need pinpoint accuracy. This is really great for analytic refinement.
By contrast, we recommend using a hands off assessment. If you want to paint broad strokes of coverage and you want a fast turnaround, this is great for like high level architecture and engineering.
In this lesson, we're primarily going to talk about the bottom one on running a hands off assessment
so that we can. We can really focus on painting broad strokes of coverage.
So a few summary notes and takeaways to close out this lesson
assessments allow you to do a variety of things, including communicate capabilities with a common reference.
Informed tooling purchases for the biggest return on investment,
identify data sources that can best enhance your detection capabilities
and, lastly, building off of data sources to develop analytics that target the highest impact threats.
Additionally, you can run assessments either in a hands off or hands on mode
hands on can be costly and time consuming, but they do offer a very high accuracy.
Hands off, by contrast, can be fast and minimally invasive but aren't always perfectly accurate
and then to close out. When we go through this course and we talk about assessments, we talk about hands off attack based stock assessments.