mitre

Home|Tag: mitre

Regularly Validating Security Controls with Breach and Attack Simulation

Regularly Validating Security Controls with Breach and Attack Simulation   Validating Security Controls is of vital importance for all organisations and is mandated by Cyber Security Frameworks like National Institute of Standards and Technology (N.I.S.T.) who offer a simple high-level way to do this using 5 steps:   IDENTIFY (CROWN JEWELS) PROTECT DETECT RESPOND RECOVER   To emphasise the importance of validating Security Control on a regular basis think of pilots doing a pre-flight check and inspection of their aircraft. Not performing these checks and inspections could lead to a loss of license for the pilots and the airline as it is mandatory and so should validating your organisation’s Security Controls. Simplistically you start by Identifying a Crown Jewel which could be an Endpoint, A Domain Controller or a Business Application. The next step is to detail and understand the attack vectors, which could be infiltration via email or a

By |2020-05-18T13:22:53+00:00May 18th, 2020|Blog|0 Comments

Breach and Attack Simulation vs Penetration Testing

Breach and Attack Simulation vs Penetration Testing Cyber attacks have evolved dramatically in the past decades. The capabilities, scope, fallout and number of targets of these attacks have greatly increased. This has resulted in damages from cybercrimes reaching all time, worldwide highs which are only set to increase. As a result, organisations are finding it necessary to test their organisation’s cyber security posture on the regular. Elasticito can help you navigate this process to find a solution suitable to your organisation. MITRE-ATT&CK-APT3+APT29 | Elasticito A Common Question! A common question people evaluating cyber security testing options for their organisations ask us is: “how does Breach & Attack Simulation differ from penetration testing”? The simple and shortest answer to this question is that both have their own part to play in making enterprise cyber defences more effective. Breach & Attack Simulation (BAS) are tools that allow businesses to simulate

By |2020-05-11T13:26:50+00:00May 11th, 2020|Blog|0 Comments

Using Breach and Attack Simulation with MITRE ATT&CK to highlight threat actor behaviours

MITRE ATT&CK is a phenomenal global free knowledge base produced by MITRE, a US Government research organisation, that maps adversary tactics and techniques that are used by threat actors to launch cyber attacks against targets.  The ATT&CK framework (which stands for Adversarial Tactics, Techniques, and Common Knowledge) began its life in 2013 and now incorporates a vast array of Tactics, Techniques and Procedures (TTPs). As Sun Tzu famously wrote in The Art of War, 'Know your enemy ...' - this is about understanding how cyber adversaries operate and what tactics and techniques they use when conducting reconnaissance on a target and launching an attack, with the aim to try and disrupt their activity to make an attack too complex or too costly for the attacker to pursue. MITRE ATT&CK Navigator The MITRE ATT&CK Navigator is used to map and filter adversary TTPs in order to understand the phases and techniques

By |2020-04-07T06:55:30+00:00April 6th, 2020|Blog|0 Comments