SlideShare a Scribd company logo
Using Mitre Att&ck with Vulnerability
Management
Simon Roe
October 2021
Agenda
2
• What is the Mitre Att&ck framework
• Threat intelligence and the Mitre Att&ck framework
• Mapping vulnerabilities to the Mitre Att&ck framework
• Putting it all together
Founded
2001
in Sweden
210+
Employees
worldwide
Customers in
80
countries
2000
global
customers
Company milestone
2020 2021
RBVM
Launch Farsight
vulnerability
prioritization
technology
Development
Open Scandinavian
Software Parkin
Vietnamto increase
product innovation
Funding
Secure a 💰 SEK 200
millionnewfunding
round to accelerate
growth
Leadership
Karl Thedeen
appointedas newCEO
+ new boardmembers
from Northvolt
Handelsbankenand
Svea Solar
Acquisition
Acquires threat
intelligence solution
Blueliv to add hacker
contextto security
assessment
Continue to
advanceour
full stack
productvision
4
To become one
of the biggest
cybersecurity
provider
What is the MITRE ATT&CK framework
5
“MITRE ATT&CK® is a globally-accessibleknowledgebase of adversary tactics and techniques based
on real-world observations.”
• First att&ck model was proposed in 2013 and publiclyreleased in 2015
• It’s been gathering momentum over the last couple of years.
Tactics, Technique and Procedures
6
7
• A Knowledgebase of adversarial
tactics
• Contains
• 14 tactics
• With over 500 associated
techniques
• Based on observed incidents
The Att&ckframework in a nutshell
8
• Build specific threat models
• Based on tactics of concern
• Create defensive strategies
• Incident response
• Tools and processes
• All with an aim to secure an organisation
against possible breach
Organizations use it to ..
What Gartner say….
9
How Threat Intel & Att&ck mesh
10
11
• Good threat intel allows you to
understand
• Threat actor behavior
• Campaigns
• Targets
• Or in other words : observable
intelligence on bad guy activity
Threat Intel
Mitre Att&ck & threat intel
• Since Att&ck is based on observable real-world incidents
• Threat intel lends itself to being mapped
• Campaigns
• Can be mapped based on the behaviors seen
• Built up over time to get a full picture of all the potential tactics and techniques being
used
• Threat Actors
• Can be tied to campaigns
• And so can map threat actors to Tactics and techniques based on the observed
campaigns they have been responsible for
12
13
TI & Att&ck response
• Identify Threat Actors of most concern to your organization
• Campaign, region, specific target (business sector)
• Map those to the Att&ck framework
• Plan defense strategies accordingly
• Monitor Logs and SIEM for patterns
• Compare to monitored Threat Attackers & their tactics / techniques
• But where do vulnerabilities fit into all this?
14
Vulnerability Management and Att&ck
15
16
• A CVE is allocated to the
vulnerability
• Another Mitre framework
• And then it's given a CVSS Score
• Via the NVD (National vulnerability
database)
• And this is used to prioritize
you’re remediation plan
• Critical, highs, mediums etc.
Traditional vulnerability management
17
• Risk Based vulnerability management
• Maps threat intelligence information to a vulnerability
• Does it have an exploit
• Has it been exploited recently
• Are threat actors trading information on the
vulnerability
• What is the targets criticality
• To create a risk score (out of 100, 38.46, grade A – D, F
etc)
• Some approaches also included future prediction of
exploit risk
• Whats the likelihood of a futureexploit happening with
this vulnerability
Sheer number of vulnerabilities requires a
new approach
Vulnerabilities vs Att&ck framework
• Vulnerabilities are not strictly speaking ‘adversarial tactics’
• But they are used in Malware, ransomware etc
• Considerations when trying to map to the Att&ck framework
• CVE’s won’t map to all the att&ck tactics or techniques*
• NIST/Mitre information on a vulnerability isn’t enough to map to the Att&ck
framework*
• Manual analysis of over 130,000 vulnerability and growing simply cannot
scale*
• So, can it be done?
*for more information see https://info.cyr3con.ai/hubfs/Mapping%20CVE%20Records%20to%20the%20ATT%26CK%20Framework.pdf by Cyr3con
18
Can you map a Vulnerability to the Att&ck framework?
• In short : Yes – using AI / ML
• Mapping to Att&ck
• Shows what techniques a vulnerability could utilize
• Allows for an understanding of how remediation of a vulnerability can disrupt
the attack chain
• For example: CVE-2019-5591 (Fortinet FortiOS vulnerability)
• 1124-System Time Discovery, 1033-System Owner/User Discovery, 1120-Peripheral Device Discovery, 1057-Process Discovery, 1016-System Network
Configuration Discovery, 1087-Account Discovery, 1595-Active Scanning, 1083-File and Directory Discovery, 1046-Network Service Scanning, 1007-System
Service Discovery, 1018-Remote System Discovery, 1069-Permission Groups Discovery, 1082-System Information Discovery, 18-Credential/Session Prediction,
1135-Network Share Discovery, 1217-Browser Bookmark Discovery, 45-Fingerprinting]
• Addressing this vulnerability would disrupt all these Att&ck techniques, making it harder to use this vulnerability as
part of an attempt to compromise. (NB this vuln was never used ina campaign, butwas directly exploited–seeSans Top25vulns)
19
Putting it together
20
Where do you start with a VM program
• Asset Centric view?
• Asset centric with Threat Intel?
• Threat vector view?
• Let’s dig into these options
21
Evolution of VM w/ Threat Intel
22
Discover
assets
Assess for
vulns
Prioritize by
severity
Remediate
The “Find and Fix” game
Appropriate method for
• small estates
• slowly changing estates
Answers the question “where can I be attacked?”
Evolution of VM w/ Threat Intel
23
Discover
assets
Assess for
vulns
Prioritize by
likelihood
Remediate
The “Vulnerability Risk” game
Really good when remediation is overwhelming
Appropriate method for
• large estates
• rapidly changing estates
• Answers the questions “where am I mostlikely to be attacked?”
Evolution of VM w/ Threat Intel
24
Evaluate
Threat
actors
Determine
TTPs
Assess for
vulns
Remediate
The “threat vector” game
Really good when evaluating full stack
Starts with attacker, pivot to vulnerabilities
Assumes you have discovered all assets
An example – Wannacry
25
CVE-2017-0147
1124-System Time Discovery,
1033-System Owner/User Discovery,
1120-Peripheral Device Discovery,
1057-Process Discovery,
1016-System Network Configuration Discovery,
1087-Account Discovery,
1595-Active Scanning,
1083-File and Directory Discovery,
1046-Network Service Scanning,
1007-System Service Discovery,
1018-Remote System Discovery,
1069-Permission Groups Discovery,
1082-System Information Discovery,
1135-Network Share Discovery,
1217-Browser Bookmark Discovery
Summary
• Using the Mitre Att&ck framework can provide organizations great
insights into how to protect against threat actors
• Mapping vulnerabilities to Att&ck has its own challenges. But done
properly can help breaking attack chains
• But adopting a model that supports both threat vector and risk-based
approaches gives organizations the ability to assess their attack
surface from all angles
26
SimonRoe, sro@outpost24.com
Questions?

More Related Content

What's hot (20)

PPTX
Wireshark Basic Presentation
MD. SHORIFUL ISLAM
 
PPTX
Zero Trust and Data Security
Career Communications Group
 
ODP
Web Application Firewall
Chandrapal Badshah
 
PPTX
Cyber kill chain
Ankita Ganguly
 
PDF
Cyber Security: The Strategic View
Cisco Canada
 
PPTX
Information and data security advanced encryption standard (aes)
Mazin Alwaaly
 
PPTX
NMAP - The Network Scanner
n|u - The Open Security Community
 
PPTX
What is SASE and How Can Partners Talk About it?
QOS Networks
 
PPT
Fortinet FortiOS 5 Presentation
NCS Computech Ltd.
 
PDF
Secure Design: Threat Modeling
Narudom Roongsiriwong, CISSP
 
PPTX
Zero Trust
Boaz Shunami
 
PDF
Meraki Cloud Networking Workshop
Cisco Canada
 
PDF
INCIDENT RESPONSE NIST IMPLEMENTATION
Sylvain Martinez
 
PPTX
Authentication
primeteacher32
 
PDF
Cybersecurity Basics - Aravindr.com
Aravind R
 
PPTX
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Ulf Mattsson
 
PDF
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Enterprise Management Associates
 
PPTX
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
Qualcomm
 
PPTX
DomainKeys Identified Mail (DKIM).pptx
SrijanKumarShetty
 
PPTX
Does Anyone Remember Enterprise Security Architecture?
rbrockway
 
Wireshark Basic Presentation
MD. SHORIFUL ISLAM
 
Zero Trust and Data Security
Career Communications Group
 
Web Application Firewall
Chandrapal Badshah
 
Cyber kill chain
Ankita Ganguly
 
Cyber Security: The Strategic View
Cisco Canada
 
Information and data security advanced encryption standard (aes)
Mazin Alwaaly
 
NMAP - The Network Scanner
n|u - The Open Security Community
 
What is SASE and How Can Partners Talk About it?
QOS Networks
 
Fortinet FortiOS 5 Presentation
NCS Computech Ltd.
 
Secure Design: Threat Modeling
Narudom Roongsiriwong, CISSP
 
Zero Trust
Boaz Shunami
 
Meraki Cloud Networking Workshop
Cisco Canada
 
INCIDENT RESPONSE NIST IMPLEMENTATION
Sylvain Martinez
 
Authentication
primeteacher32
 
Cybersecurity Basics - Aravindr.com
Aravind R
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Ulf Mattsson
 
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Enterprise Management Associates
 
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
Qualcomm
 
DomainKeys Identified Mail (DKIM).pptx
SrijanKumarShetty
 
Does Anyone Remember Enterprise Security Architecture?
rbrockway
 

Similar to Outpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK Framework (20)

PPTX
Application Threat Modeling
Rochester Security Summit
 
PDF
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
Andreas Sfakianakis
 
PPTX
Outpost24 Webinar - Five steps to build a killer Application Security Program
Outpost24
 
PDF
ARES Next-Gen Risk Management Platform
Tieu Luu
 
PPTX
PHDays 9: new methods of Vulnerability Prioritization in Vulnerability Manage...
Alexander Leonov
 
PDF
Outpost24 webinar - risk based vulnerability management - what's in a risk score
Outpost24
 
PPTX
CSO CXO Series Breakfast
CSO_Presentations
 
PPTX
One login enemy at the gates
Eoin Keary
 
PPTX
Виталий Трахтенберг (Израиль), MER Group. Кейс по кибер-расследованию для одн...
KazHackStan
 
PDF
What your scanner isn't telling you
Core Security
 
PPTX
Making Sense of Threat Reports
DLT Solutions
 
PPTX
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Outpost24
 
PPTX
Threat Modeling And Analysis
Lalit Kale
 
PDF
Threat Modeling to Reduce Software Security Risk
Security Innovation
 
PPTX
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
Scott Sutherland
 
PPTX
Outpost24 webinar - Cybersecurity readiness in the post Covid-19 world
Outpost24
 
PPTX
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
Jack Shaffer
 
PPTX
Using an Open Source Threat Model for Prioritized Defense
EnclaveSecurity
 
PDF
Doten apt presentaiton (2)
Jeff Green
 
PDF
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...
Priyanka Aash
 
Application Threat Modeling
Rochester Security Summit
 
Threat Intelligence: State-of-the-art and Trends - Secure South West 2015
Andreas Sfakianakis
 
Outpost24 Webinar - Five steps to build a killer Application Security Program
Outpost24
 
ARES Next-Gen Risk Management Platform
Tieu Luu
 
PHDays 9: new methods of Vulnerability Prioritization in Vulnerability Manage...
Alexander Leonov
 
Outpost24 webinar - risk based vulnerability management - what's in a risk score
Outpost24
 
CSO CXO Series Breakfast
CSO_Presentations
 
One login enemy at the gates
Eoin Keary
 
Виталий Трахтенберг (Израиль), MER Group. Кейс по кибер-расследованию для одн...
KazHackStan
 
What your scanner isn't telling you
Core Security
 
Making Sense of Threat Reports
DLT Solutions
 
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Outpost24
 
Threat Modeling And Analysis
Lalit Kale
 
Threat Modeling to Reduce Software Security Risk
Security Innovation
 
2017 Q1 Arcticcon - Meet Up - Adventures in Adversarial Emulation
Scott Sutherland
 
Outpost24 webinar - Cybersecurity readiness in the post Covid-19 world
Outpost24
 
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
Jack Shaffer
 
Using an Open Source Threat Model for Prioritized Defense
EnclaveSecurity
 
Doten apt presentaiton (2)
Jeff Green
 
(SACON) Dr. Soumya Maity & Lokesh Balu - A scalable, control-based, developer...
Priyanka Aash
 
Ad

More from Outpost24 (20)

PPTX
Outpost24 webinar - A fresh look into the underground card shop ecosystem
Outpost24
 
PDF
Outpost24 webinar Why API security matters and how to get it right.pdf
Outpost24
 
PPTX
Outpost24 webinar - How to protect your organization from credential theft
Outpost24
 
PPTX
Outpost24 webinar : Beating hackers at their own game 2022 predictions
Outpost24
 
PPTX
Outpost24 webinar - Enhance user security to stop the cyber-attack cycle
Outpost24
 
PPTX
Outpost24 webinar: best practice for external attack surface management
Outpost24
 
PPTX
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
Outpost24
 
PPTX
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
Outpost24
 
PDF
Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...
Outpost24
 
PPTX
Outpost24 webinar - Api security
Outpost24
 
PDF
Outpost24 Webinar - CISO conversation behind the cyber security technology
Outpost24
 
PDF
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Outpost24
 
PDF
Outpost24 webinar - How to secure cloud services in the DevOps fast lane
Outpost24
 
PPTX
Outpost24 webinar - Demystifying Web Application Security with Attack Surface...
Outpost24
 
PPTX
Outpost24 webinar - Winning the cybersecurity race with predictive vulnerabil...
Outpost24
 
PPTX
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24
 
PPTX
Outpost24 webinar mastering container security in modern day dev ops
Outpost24
 
PPTX
Outpost24 webinar - Protecting Cezanne HR’s cloud web application with contin...
Outpost24
 
PPTX
Outpost24 webinar - Understanding the 7 deadly web application attack vectors
Outpost24
 
PPTX
Outpost24 webinar - Securing DevOps in Cloud Environments
Outpost24
 
Outpost24 webinar - A fresh look into the underground card shop ecosystem
Outpost24
 
Outpost24 webinar Why API security matters and how to get it right.pdf
Outpost24
 
Outpost24 webinar - How to protect your organization from credential theft
Outpost24
 
Outpost24 webinar : Beating hackers at their own game 2022 predictions
Outpost24
 
Outpost24 webinar - Enhance user security to stop the cyber-attack cycle
Outpost24
 
Outpost24 webinar: best practice for external attack surface management
Outpost24
 
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
Outpost24
 
Outpost24 Webinar - DevOps to DevSecOps: delivering quality and secure develo...
Outpost24
 
Outpost24 webinar - Why asset discovery is the missing link to enterprise vul...
Outpost24
 
Outpost24 webinar - Api security
Outpost24
 
Outpost24 Webinar - CISO conversation behind the cyber security technology
Outpost24
 
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Outpost24
 
Outpost24 webinar - How to secure cloud services in the DevOps fast lane
Outpost24
 
Outpost24 webinar - Demystifying Web Application Security with Attack Surface...
Outpost24
 
Outpost24 webinar - Winning the cybersecurity race with predictive vulnerabil...
Outpost24
 
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24
 
Outpost24 webinar mastering container security in modern day dev ops
Outpost24
 
Outpost24 webinar - Protecting Cezanne HR’s cloud web application with contin...
Outpost24
 
Outpost24 webinar - Understanding the 7 deadly web application attack vectors
Outpost24
 
Outpost24 webinar - Securing DevOps in Cloud Environments
Outpost24
 
Ad

Recently uploaded (20)

PDF
UITP Summit Meep Pitch may 2025 MaaS Rebooted
campoamor1
 
PDF
AI Prompts Cheat Code prompt engineering
Avijit Kumar Roy
 
PDF
Empower Your Tech Vision- Why Businesses Prefer to Hire Remote Developers fro...
logixshapers59
 
PPTX
Build a Custom Agent for Agentic Testing.pptx
klpathrudu
 
PPTX
prodad heroglyph crack 2.0.214.2 Full Free Download
cracked shares
 
PPTX
Transforming Insights: How Generative AI is Revolutionizing Data Analytics
LetsAI Solutions
 
PDF
Technical-Careers-Roadmap-in-Software-Market.pdf
Hussein Ali
 
PDF
[Solution] Why Choose the VeryPDF DRM Protector Custom-Built Solution for You...
Lingwen1998
 
PPTX
Comprehensive Risk Assessment Module for Smarter Risk Management
EHA Soft Solutions
 
PDF
AI + DevOps = Smart Automation with devseccops.ai.pdf
Devseccops.ai
 
PPTX
Get Started with Maestro: Agent, Robot, and Human in Action – Session 5 of 5
klpathrudu
 
PDF
AOMEI Partition Assistant Crack 10.8.2 + WinPE Free Downlaod New Version 2025
bashirkhan333g
 
PDF
Wondershare PDFelement Pro Crack for MacOS New Version Latest 2025
bashirkhan333g
 
PDF
ERP Consulting Services and Solutions by Contetra Pvt Ltd
jayjani123
 
PPTX
Library_Management_System_PPT111111.pptx
nmtnissancrm
 
PDF
MiniTool Partition Wizard Free Crack + Full Free Download 2025
bashirkhan333g
 
PDF
4K Video Downloader Plus Pro Crack for MacOS New Download 2025
bashirkhan333g
 
PDF
Meet in the Middle: Solving the Low-Latency Challenge for Agentic AI
Alluxio, Inc.
 
PDF
TheFutureIsDynamic-BoxLang witch Luis Majano.pdf
Ortus Solutions, Corp
 
PPTX
Foundations of Marketo Engage - Powering Campaigns with Marketo Personalization
bbedford2
 
UITP Summit Meep Pitch may 2025 MaaS Rebooted
campoamor1
 
AI Prompts Cheat Code prompt engineering
Avijit Kumar Roy
 
Empower Your Tech Vision- Why Businesses Prefer to Hire Remote Developers fro...
logixshapers59
 
Build a Custom Agent for Agentic Testing.pptx
klpathrudu
 
prodad heroglyph crack 2.0.214.2 Full Free Download
cracked shares
 
Transforming Insights: How Generative AI is Revolutionizing Data Analytics
LetsAI Solutions
 
Technical-Careers-Roadmap-in-Software-Market.pdf
Hussein Ali
 
[Solution] Why Choose the VeryPDF DRM Protector Custom-Built Solution for You...
Lingwen1998
 
Comprehensive Risk Assessment Module for Smarter Risk Management
EHA Soft Solutions
 
AI + DevOps = Smart Automation with devseccops.ai.pdf
Devseccops.ai
 
Get Started with Maestro: Agent, Robot, and Human in Action – Session 5 of 5
klpathrudu
 
AOMEI Partition Assistant Crack 10.8.2 + WinPE Free Downlaod New Version 2025
bashirkhan333g
 
Wondershare PDFelement Pro Crack for MacOS New Version Latest 2025
bashirkhan333g
 
ERP Consulting Services and Solutions by Contetra Pvt Ltd
jayjani123
 
Library_Management_System_PPT111111.pptx
nmtnissancrm
 
MiniTool Partition Wizard Free Crack + Full Free Download 2025
bashirkhan333g
 
4K Video Downloader Plus Pro Crack for MacOS New Download 2025
bashirkhan333g
 
Meet in the Middle: Solving the Low-Latency Challenge for Agentic AI
Alluxio, Inc.
 
TheFutureIsDynamic-BoxLang witch Luis Majano.pdf
Ortus Solutions, Corp
 
Foundations of Marketo Engage - Powering Campaigns with Marketo Personalization
bbedford2
 

Outpost24 webinar - Mapping Vulnerabilities with the MITRE ATT&CK Framework

  • 1. Using Mitre Att&ck with Vulnerability Management Simon Roe October 2021
  • 2. Agenda 2 • What is the Mitre Att&ck framework • Threat intelligence and the Mitre Att&ck framework • Mapping vulnerabilities to the Mitre Att&ck framework • Putting it all together
  • 4. Company milestone 2020 2021 RBVM Launch Farsight vulnerability prioritization technology Development Open Scandinavian Software Parkin Vietnamto increase product innovation Funding Secure a 💰 SEK 200 millionnewfunding round to accelerate growth Leadership Karl Thedeen appointedas newCEO + new boardmembers from Northvolt Handelsbankenand Svea Solar Acquisition Acquires threat intelligence solution Blueliv to add hacker contextto security assessment Continue to advanceour full stack productvision 4 To become one of the biggest cybersecurity provider
  • 5. What is the MITRE ATT&CK framework 5 “MITRE ATT&CK® is a globally-accessibleknowledgebase of adversary tactics and techniques based on real-world observations.” • First att&ck model was proposed in 2013 and publiclyreleased in 2015 • It’s been gathering momentum over the last couple of years.
  • 6. Tactics, Technique and Procedures 6
  • 7. 7 • A Knowledgebase of adversarial tactics • Contains • 14 tactics • With over 500 associated techniques • Based on observed incidents The Att&ckframework in a nutshell
  • 8. 8 • Build specific threat models • Based on tactics of concern • Create defensive strategies • Incident response • Tools and processes • All with an aim to secure an organisation against possible breach Organizations use it to ..
  • 10. How Threat Intel & Att&ck mesh 10
  • 11. 11 • Good threat intel allows you to understand • Threat actor behavior • Campaigns • Targets • Or in other words : observable intelligence on bad guy activity Threat Intel
  • 12. Mitre Att&ck & threat intel • Since Att&ck is based on observable real-world incidents • Threat intel lends itself to being mapped • Campaigns • Can be mapped based on the behaviors seen • Built up over time to get a full picture of all the potential tactics and techniques being used • Threat Actors • Can be tied to campaigns • And so can map threat actors to Tactics and techniques based on the observed campaigns they have been responsible for 12
  • 13. 13
  • 14. TI & Att&ck response • Identify Threat Actors of most concern to your organization • Campaign, region, specific target (business sector) • Map those to the Att&ck framework • Plan defense strategies accordingly • Monitor Logs and SIEM for patterns • Compare to monitored Threat Attackers & their tactics / techniques • But where do vulnerabilities fit into all this? 14
  • 16. 16 • A CVE is allocated to the vulnerability • Another Mitre framework • And then it's given a CVSS Score • Via the NVD (National vulnerability database) • And this is used to prioritize you’re remediation plan • Critical, highs, mediums etc. Traditional vulnerability management
  • 17. 17 • Risk Based vulnerability management • Maps threat intelligence information to a vulnerability • Does it have an exploit • Has it been exploited recently • Are threat actors trading information on the vulnerability • What is the targets criticality • To create a risk score (out of 100, 38.46, grade A – D, F etc) • Some approaches also included future prediction of exploit risk • Whats the likelihood of a futureexploit happening with this vulnerability Sheer number of vulnerabilities requires a new approach
  • 18. Vulnerabilities vs Att&ck framework • Vulnerabilities are not strictly speaking ‘adversarial tactics’ • But they are used in Malware, ransomware etc • Considerations when trying to map to the Att&ck framework • CVE’s won’t map to all the att&ck tactics or techniques* • NIST/Mitre information on a vulnerability isn’t enough to map to the Att&ck framework* • Manual analysis of over 130,000 vulnerability and growing simply cannot scale* • So, can it be done? *for more information see https://info.cyr3con.ai/hubfs/Mapping%20CVE%20Records%20to%20the%20ATT%26CK%20Framework.pdf by Cyr3con 18
  • 19. Can you map a Vulnerability to the Att&ck framework? • In short : Yes – using AI / ML • Mapping to Att&ck • Shows what techniques a vulnerability could utilize • Allows for an understanding of how remediation of a vulnerability can disrupt the attack chain • For example: CVE-2019-5591 (Fortinet FortiOS vulnerability) • 1124-System Time Discovery, 1033-System Owner/User Discovery, 1120-Peripheral Device Discovery, 1057-Process Discovery, 1016-System Network Configuration Discovery, 1087-Account Discovery, 1595-Active Scanning, 1083-File and Directory Discovery, 1046-Network Service Scanning, 1007-System Service Discovery, 1018-Remote System Discovery, 1069-Permission Groups Discovery, 1082-System Information Discovery, 18-Credential/Session Prediction, 1135-Network Share Discovery, 1217-Browser Bookmark Discovery, 45-Fingerprinting] • Addressing this vulnerability would disrupt all these Att&ck techniques, making it harder to use this vulnerability as part of an attempt to compromise. (NB this vuln was never used ina campaign, butwas directly exploited–seeSans Top25vulns) 19
  • 21. Where do you start with a VM program • Asset Centric view? • Asset centric with Threat Intel? • Threat vector view? • Let’s dig into these options 21
  • 22. Evolution of VM w/ Threat Intel 22 Discover assets Assess for vulns Prioritize by severity Remediate The “Find and Fix” game Appropriate method for • small estates • slowly changing estates Answers the question “where can I be attacked?”
  • 23. Evolution of VM w/ Threat Intel 23 Discover assets Assess for vulns Prioritize by likelihood Remediate The “Vulnerability Risk” game Really good when remediation is overwhelming Appropriate method for • large estates • rapidly changing estates • Answers the questions “where am I mostlikely to be attacked?”
  • 24. Evolution of VM w/ Threat Intel 24 Evaluate Threat actors Determine TTPs Assess for vulns Remediate The “threat vector” game Really good when evaluating full stack Starts with attacker, pivot to vulnerabilities Assumes you have discovered all assets
  • 25. An example – Wannacry 25 CVE-2017-0147 1124-System Time Discovery, 1033-System Owner/User Discovery, 1120-Peripheral Device Discovery, 1057-Process Discovery, 1016-System Network Configuration Discovery, 1087-Account Discovery, 1595-Active Scanning, 1083-File and Directory Discovery, 1046-Network Service Scanning, 1007-System Service Discovery, 1018-Remote System Discovery, 1069-Permission Groups Discovery, 1082-System Information Discovery, 1135-Network Share Discovery, 1217-Browser Bookmark Discovery
  • 26. Summary • Using the Mitre Att&ck framework can provide organizations great insights into how to protect against threat actors • Mapping vulnerabilities to Att&ck has its own challenges. But done properly can help breaking attack chains • But adopting a model that supports both threat vector and risk-based approaches gives organizations the ability to assess their attack surface from all angles 26