MITRE ATT&CK Matrix in ETM
The MITRE ATT&CK Matrix is a framework created by the non-profit organization MITRE. It helps organizations understand and respond to cyber attacks by describing how attackers behave. This tool gives the cybersecurity community a common way to talk about and analyze threats so they can better protect against them.
Using Qualys provisioned Enterprise MITRE ATT&CK Matrix; you can identify the gaps in the security architecture, instantly contain the threat, and protect your organization from new attacks.
Component of the ATT&CK Matrix
Before proceeding understand the following MITRE ATT&CK terms.
- Adversarial
These are individuals or groups trying to break into or attack systems. They are the attackers that the MITRE ATT&CK framework studies and classifies.
- Tactics (Understanding the Motives Behind Attacks)
Tactics explain what attackers want to achieve at different stages of their attacks. Each tactic is related to a specific part of the attack process. Examples include getting initial access, running code, gaining higher privileges, and avoiding detection.
- Techniques (Understanding Attack Methods)
Techniques explain the specific methods that attackers use to carry out a tactic. Each technique shows how they reach their goals and may include variations known as sub-techniques.
Let us take an example, when an attacker uses a general technique like Phishing, there can be multiple specific ways to carry it out. These variations are referred to as sub-techniques in the MITRE ATT&CK framework.
Technique: Phishing (T1566)
Phishing is a broad method where attackers attempt to deceive users into revealing sensitive information or performing an action that benefits the attacker, such as downloading malware.
- Common Knowledge
This refers to the documented ways that attackers use different tactics and techniques. It includes real-life examples and patterns of attacker behavior gathered by MITRE.
- Risk Findings
These are threats or vulnerabilities identified in the MITRE ATT&CK Matrix within ETM. This information helps decide which risks to tackle first, based on how likely attackers are to take advantage of them
List of MITRE ATT&CK Tactics and Techniques
Currently, there are 14 Tactics and more than 150 Techniques. To know more about each Tactics and Techniques, refer to the MITRE ATT&CKwebpage.
MITRE ATT&CK Matrix in Qualys ETM
The ETM application uses the MITRE ATT&CK framework in matrix form based on vulnerabilities and misconfigurations. The MITRE ATT&CK Matrix in the ETM application's Risk Management tab shows a detailed view of Tactics and Techniques.
To know the details of this feature, go to Prioritization using MITRE ATT&CK Matrix.