| Literature DB >> 34065086 |
Anna Georgiadou1, Spiros Mouzakitis1, Dimitris Askounis1.
Abstract
The MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) Framework provides a rich and actionable repository of adversarial tactics, techniques, and procedures. Its innovative approach has been broadly welcomed by both vendors and enterprise customers in the industry. Its usage extends from adversary emulation, red teaming, behavioral analytics development to a defensive gap and SOC (Security Operations Center) maturity assessment. While extensive research has been done on analyzing specific attacks or specific organizational culture and human behavior factors leading to such attacks, a holistic view on the association of both is currently missing. In this paper, we present our research results on associating a comprehensive set of organizational and individual culture factors (as described on our developed cyber-security culture framework) with security vulnerabilities mapped to specific adversary behavior and patterns utilizing the MITRE ATT&CK framework. Thus, exploiting MITRE ATT&CK's possibilities towards a scientific direction that has not yet been explored: security assessment and defensive design, a step prior to its current application domain. The suggested cyber-security culture framework was originally designed to aim at critical infrastructures and, more specifically, the energy sector. Organizations of these domains exhibit a co-existence and strong interaction of the IT (Information Technology) and OT (Operational Technology) networks. As a result, we emphasize our scientific effort on the hybrid MITRE ATT&CK for Enterprise and ICS (Industrial Control Systems) model as a broader and more holistic approach. The results of our research can be utilized in an extensive set of applications, including the efficient organization of security procedures as well as enhancing security readiness evaluation results by providing more insights into imminent threats and security risks.Entities:
Keywords: MITRE ATT&CK matrix; cyber-security culture framework; detection; mitigation techniques; security assessment
Year: 2021 PMID: 34065086 PMCID: PMC8125987 DOI: 10.3390/s21093267
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Cyber-Security Culture Framework.
MITRE ATT&CK for the Enterprise and ICS Mitigations List.
| ID | Name | ATT&CK for Enterprise | ATT&CK for ICS |
|---|---|---|---|
| M0800 | Authorization Enforcement | ● | |
| M0801 | Access Management | ● | |
| M0802 | Communication Authenticity | ● | |
| M0803 | Data Loss Prevention | ● | |
| M0804 | Human User Authentication | ● | |
| M0805 | Mechanical Protection Layers | ● | |
| M0806 | Minimize Wireless Signal Propagation | ● | |
| M0807 | Network Allowlists | ● | |
| M0808 | Encrypt Network Traffic | ● | |
| M0809 | Operational Information Confidentiality | ● | |
| M0810 | Out-of-Band Communications Channel | ● | |
| M0811 | Redundancy of Service | ● | |
| M0812 | Safety Instrumented Systems | ● | |
| M0813 | Software Process and Device Authentication | ● | |
| M0814 | Static Network Configuration | ● | |
| M0815 | Watchdog Timers | ● | |
| M0816 | Mitigation Limited or Not Effective | ● | |
| M1013 | Application Developer Guidance | ● | ● |
| M1015 | Active Directory Configuration | ● | ● |
| M1016 | Vulnerability Scanning | ● | ● |
| M1017 | User Training | ● | ● |
| M1018 | User Account Management | ● | ● |
| M1019 | Threat Intelligence Program | ● | ● |
| M1020 | SSL/TLS Inspection | ● | ● |
| M1021 | Restrict Web-Based Content | ● | ● |
| M1022 | Restrict File and Directory Permissions | ● | ● |
| M1024 | Restrict Registry Permissions | ● | ● |
| M1025 | Privileged Process Integrity | ● | |
| M1026 | Privileged Account Management | ● | ● |
| M1027 | Password Policies | ● | ● |
| M1028 | Operating System Configuration | ● | ● |
| M1029 | Remote Data Storage | ● | |
| M1030 | Network Segmentation | ● | ● |
| M1031 | Network Intrusion Prevention | ● | ● |
| M1032 | Multi-factor Authentication | ● | ● |
| M1033 | Limit Software Installation | ● | |
| M1034 | Limit Hardware Installation | ● | ● |
| M1035 | Limit Access to Resource Over Network | ● | ● |
| M1036 | Account Use Policies | ● | ● |
| M1037 | Filter Network Traffic | ● | ● |
| M1038 | Execution Prevention | ● | ● |
| M1039 | Environment Variable Permissions | ● | |
| M1040 | Behavior Prevention on Endpoint | ● | |
| M1041 | Encrypt Sensitive Information | ● | ● |
| M1042 | Disable or Remove Feature or Program | ● | ● |
| M1043 | Credential Access Protection | ● | |
| M1044 | Restrict Library Loading | ● | ● |
| M1045 | Code Signing | ● | ● |
| M1046 | Boot Integrity | ● | ● |
| M1047 | Audit | ● | ● |
| M1048 | Application Isolation and Sandboxing | ● | ● |
| M1049 | Antivirus/Antimalware | ● | ● |
| M1050 | Exploit Protection | ● | ● |
| M1051 | Update Software | ● | ● |
| M1052 | User Account Control | ● | |
| M1053 | Data Backup | ● | ● |
| M1054 | Software Configuration | ● | ● |
| M1055 | Do Not Mitigate | ● | |
| M1056 | Pre-compromise | ● |
Cyber-Security Culture model relation to MITRE ATT&CK for Enterprise and ICS Mitigations.
| Level | Dimension | Domain | MITRE ATT&CK Mitigation |
|---|---|---|---|
|
|
| Application Software Security | M0813 |
| M0815 | |||
| M1013 | |||
| M1040 | |||
| M1042 | |||
| M1045 | |||
| Data Security and Privacy | M0803 | ||
| Hardware Assets Management | M0813 | ||
| M1034 | |||
| Hardware Configuration Management | M0815 | ||
| M1024 | |||
| M1028 | |||
| M1039 | |||
| M1046 | |||
| Network Configuration Management | M0814 | ||
| M1037 | |||
| Network Infrastructure Management | M1037 | ||
| Software Assets Management | M0815 | ||
| M1033 | |||
| M1038 | |||
| M1040 | |||
| M1042 | |||
| M1044 | |||
| M1045 | |||
| M1048 | |||
| M1054 | |||
| Personnel Security | M0804 | ||
| Physical Safety and Security | M0805 | ||
| M0812 | |||
|
| Backup Mechanisms | M1029 | |
| M1053 | |||
| Business Continuity & Disaster Recovery | M0810 | ||
| M0811 | |||
| M1053 | |||
| Continuous Vulnerability Management | M1016 | ||
| M1051 | |||
|
| Access Management | M0800 | |
| M0801 | |||
| M1015 | |||
| M1022 | |||
| M1030 | |||
| M1035 | |||
| Account Management | M1015 | ||
| M1018 | |||
| M1032 | |||
| M1036 | |||
| M1052 | |||
| Password Robustness and Exposure | M1027 | ||
| M1043 | |||
| Privileged Account Management | M1025 | ||
| M1026 | |||
| Role Segregation | M0800 | ||
| Wireless Access Management | M0806 | ||
|
| Efficient Distinction of Development, Testing and Operational Environments | M1048 | |
| Risk Assessment | M1019 | ||
|
| Boundary Defense | M0802 | |
| M0807 | |||
| M0808 | |||
| M0809 | |||
| M1020 | |||
| M1031 | |||
| Cryptography | M1041 | ||
| Email and Web Browser Resilience | M1021 | ||
| Malware Defense | M1049 | ||
| Security Awareness and Training Program | M1017 | ||
|
| Audit Logs Management | M1047 | |
| Penetration Tests and Red Team Exercises | M1050 | ||
|
|
| Security Behavior | M1017 |
|
| Security Skills Evaluation | M1017 | |
| Μ1027 | |||
| Training Completion and Scoring | M1017 |
Note: ATT&CK Mitigation “,” which is meant to associate with techniques that mitigation might increase risk of compromise and therefore mitigation is not recommended [18] and has been omitted from this table.