Skip to content

Commit

Permalink
Fix build errors
Browse files Browse the repository at this point in the history
  • Loading branch information
mehaase committed Jul 31, 2024
1 parent 65cbcc3 commit 1de88b3
Show file tree
Hide file tree
Showing 4 changed files with 20 additions and 16 deletions.
2 changes: 1 addition & 1 deletion .github/workflows/delete-web-preview.yml
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ jobs:
azure_blob:
runs-on: ubuntu-latest
env:
AZURE_STORAGE_ACCOUNT: {{ cookiecutter.storage_account }}
AZURE_STORAGE_ACCOUNT: defendingotwithattack
AZURE_STORAGE_SAS_TOKEN: ${{ secrets.AZURE_SAS_TOKEN }}
BRANCH_NAME: ${{ github.head_ref || github.ref_name }}
steps:
Expand Down
12 changes: 8 additions & 4 deletions docs/architecture.rst
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ systems.

.. figure:: ./_static/ref_arch.png
:align: center
:scale: 80%
:scale: 25%

Reference Architecture (click to enlarge)

Expand Down Expand Up @@ -53,8 +53,12 @@ Impacting ICS
Understanding impact to assets, particulary in context of ICS and application of ATT&CK
in IT and OT environments

The below table provides descriptions for each of the 21 identified Defending OT with ATT&CK Architecture Assets. All assets were mapped to
ATT&CK for Enterprise's platforms and/or ATT&CK for ICS' assets. There were nine assets where ATT&CK for Enterprise and ATT&CK for ICS overlap:
.. _asset-table:

The below table provides descriptions for each of the 21 identified Defending OT with
ATT&CK Architecture Assets. All assets were mapped to ATT&CK for Enterprise's platforms
and/or ATT&CK for ICS' assets. There were nine assets where ATT&CK for Enterprise and
ATT&CK for ICS overlap:

+--------------------------------------+---------------------------------------------------------------------------------------------------+
+ Asset Name + Description +
Expand Down Expand Up @@ -171,4 +175,4 @@ ATT&CK for Enterprise's platforms and/or ATT&CK for ICS' assets. There were nine
+ + networks together by encapsulating all data between those networks. VPN servers typically support +
+ + remote network services that are used by field VPNs to initiate the establishment of the secure +
+ + VPN tunnel between the field device and server. +
+--------------------------------------+---------------------------------------------------------------------------------------------------+
+--------------------------------------+---------------------------------------------------------------------------------------------------+
19 changes: 10 additions & 9 deletions docs/index.rst
Original file line number Diff line number Diff line change
@@ -1,26 +1,27 @@
Defending Operational Technology (OT) with ATT&CK
=================================================

Defending OT with ATT&CK provides a customized collection of `MITRE ATT&CK® <https://attack.mitre.org/>`_ techniques
tailored to the attack surface and threat model for OT environments. The collection of
Defending OT with ATT&CK provides a customized collection of `MITRE ATT&CK® <https://attack.mitre.org/>`_ techniques
tailored to the attack surface and threat model for OT environments. The collection of
threats contained in the ATT&CK knowledgebase, including historical attacks against OT,
are used to define a reference architecture and technology domains of interest for OT.
The resultant collection can be used by organizations that use OT to evaluate and employ
are used to define a reference architecture and technology domains of interest for OT.
The resultant collection can be used by organizations that use OT to evaluate and employ
security controls for real-world adversary behaviors.

This project is created and maintained by `MITRE Engenuity Center for Threat-Informed Defense (Center) <https://ctid.mitre-engenuity.org/>`_
and is funded by our research participants, in futherance of our mission to advance the state
of the art and the state of the practice in threat-informed defense globally. This work builds upon the
Center's `Defending IaaS with ATT&CK <https://mitre-engenuity.org/cybersecurity/center-for-threat-informed-defense/our-work/defending-iaas-with-attack/>`_ project by
and is funded by our research participants, in futherance of our mission to advance the state
of the art and the state of the practice in threat-informed defense globally. This work builds upon the
Center's `Defending IaaS with ATT&CK <https://mitre-engenuity.org/cybersecurity/center-for-threat-informed-defense/our-work/defending-iaas-with-attack/>`_ project by
using the methodology and tooling created under that project as a basis, and provides another collection
of resources cyber defenders can use to understand and make threat-informed decisions for techniques that
could be used within an IT/OT hybrid architecture and environment.
of resources cyber defenders can use to understand and make threat-informed decisions for techniques that
could be used within an IT/OT hybrid architecture and environment.

.. image:: _static/defending-ot.jpg
:align: center
:scale: 50%

|
.. toctree::
:maxdepth: 2
:caption: Contents
Expand Down
3 changes: 1 addition & 2 deletions make/sphinx.mk
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
SOURCEDIR = docs/
BUILDDIR = docs/_build/
BUILDDIR = docs/_build

.PHONY: docs docs-html docs-pdf

Expand All @@ -18,4 +18,3 @@ docs-pdf: ## Generate PDF documentation.
docs-server: ## Run server for local editing of docs.
sphinx-autobuild -b dirhtml -a "$(SOURCEDIR)" "$(BUILDDIR)"

sphinx-build -M dirhtml "docs/" "docs/_build/" -W --keep-going

0 comments on commit 1de88b3

Please sign in to comment.