-
Notifications
You must be signed in to change notification settings - Fork 3
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
12 changed files
with
387 additions
and
135 deletions.
There are no files selected for viewing
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Large diffs are not rendered by default.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,92 @@ | ||
Threat Collection | ||
================= | ||
|
||
The Defending OT with ATT&CK threat collection is a customized collection of MITRE ATT&CK® | ||
techniques tailored to the attack surface and threat model for OT environments. Historical attacks | ||
against OT and adversarial tactics, techniques, and procedures (TTPs) as contained in | ||
ATT&CK for Enterprise, ATT&CK for ICS, and other relevant ATT&CK datasets such as Cloud | ||
and Containers were analyzed to identify and define a reference architecture and technology | ||
domains of interest specific to OT. The resultant collection can be used by organizations | ||
that use OT to evaluate, plan, and employ security controls based on known, real-world | ||
adversary behaviors targeting those environments. | ||
|
||
Defending OT with ATT&CK provides a defined threat collection to assist defenders in | ||
understanding which techniques adversaries could use within an IT/OT hybrid architecture. | ||
This includes: | ||
|
||
* techniques that occur on enterprise systems used to manage OT, | ||
|
||
* techniques on Industrial Control Systems (ICS), and | ||
|
||
* techniques on OT assets that run similar operating systems, protocols, and applications as enterprise IT assets. | ||
|
||
.. <<!-- TO DO --!>> | ||
tagged techniques for OT environments | ||
Total ATT&CK (sub-)techniques -> Mapped to each asset and count (i.e., 510 techniques mapped to each assets). | ||
plus image | ||
downloads: | ||
- STIX bundle | ||
- multi-domain ATT&CK matrix for Navigator | ||
**Download the Threat Collection** | ||
|
||
.. <<!-- TO DO --!>> | ||
get downloads for dota | ||
.. raw:: html | ||
|
||
<p> | ||
<a class="btn btn-primary" target="_blank" href="https://mitre-attack.github.io/attack-navigator/#layerURL=https%3A%2F%2Fcenter-for-threat-informed-defense.github.io%2Finsider-threat-ttp-kb%2Fgreen_seen_v1_v2.json"> | ||
<i class="fa fa-map-signs"></i> Download ATT&CK Workbench Collection</a> | ||
|
||
<a class="btn btn-primary" target="_blank" href="..\green_seen_v1_v2.xlsx" download="green_seen_v1_v2.xlsx"> | ||
<i class="fa fa-download"></i> Download EXCEL (18kb)</a> | ||
|
||
<a class="btn btn-primary" target="_blank" href="..\green_seen_v1_v2.json" download="green_seen_v1_v2.json"> | ||
<i class="fa fa-download"></i> Download JSON (153kb)</a> | ||
</p> | ||
|
||
Building the Threat Collection | ||
------------------------------ | ||
|
||
Defending OT with ATT&CK builds upon prior work developed by the Center, including | ||
`Defending IaaS with ATT&CK <https://mitre-engenuity.org/cybersecurity/center-for-threat-informed-defense/our-work/defending-iaas-with-attack/>`_ and `ATT&CK Workbench <https://github.com/center-for-threat-informed-defense/attack-workbench-frontend/blob/master/README.md>`_. | ||
|
||
**Defending IaaS with ATT&CK** | ||
|
||
Defending OT with ATT&CK uses the methodology and tooling created as part of the Center's | ||
`Defending IaaS with ATT&CK project <https://center-for-threat-informed-defense.github.io/defending-iaas-with-attack/>`_ as a basis. The Defending IaaS project methodology provides | ||
steps to identify and select techniques across multiple ATT&CK matrices that align to a defined | ||
attack surface, proving to be a solid foundation for developing Defending OT project resources. | ||
|
||
The Center developed Defending IaaS With ATT&CK project to provide the community with a | ||
collection of MITRE ATT&CK® techniques tailored to the unique attack surface and threat model | ||
for Infrastructure-as-a-Service (IaaS). This collection can be used to plan and evaluate security | ||
controls for organizations that use IaaS based on the known adversary behaviors described by ATT&CK. | ||
|
||
**ATT&CK Workbench** | ||
|
||
The Defending OT with ATT&CK project team used `ATT&CK Workbench <https://github.com/center-for-threat-informed-defense/attack-workbench-frontend/blob/master/README.md>`_ to explore and map adversarial | ||
techniques, target assets, and campaigns. The team employed ATT&CK Workbench's search and | ||
filter features for ATT&CK for Enterprise and ATT&CK for ICS domains, determined mapping of | ||
assets to multi-domains from ATT&CK for Enterprise and ATT&CK for ICS techniques, and added | ||
rationale in Workbench's note sections, to generate the shared mapping file. | ||
|
||
The Center created ATT&CK Workbench to enable users to explore, create, annotate, and share | ||
extensions of MITRE ATT&CK®. ATT&CK Workbench allows users to manage and extend their own | ||
local version of ATT&CK and keep it synchronized with the ATT&CK knowledge base. ATT&CK Workrbench | ||
is an open source tool publicly available on `GitHub <https://github.com/center-for-threat-informed-defense/attack-workbench-frontend>`_. | ||
|
||
ATT&CK Workbench enables a number of important use cases within the ATT&CK community, such as: | ||
|
||
* **Cyber Threat Intelligence:** Take notes on techniques, groups, and other objects to collaborate within a threat intelligence team. | ||
|
||
* **Red Teaming:** Track and manage coverage of Red Team engagements the same way you track your ATT&CK coverage. | ||
|
||
* **Defensive Planning:** Stay up to date with the evolving threat landscape by downloading new releases of ATT&CK automatically. | ||
|
||
* **Collaboration with ATT&CK and the community:** Share your custom datasets with the ATT&CK community and download datasets created by others. | ||
|
||
|
||
|
||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.