Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Aligning Security Operations with the MITRE ATT&CK Framework
  • Table Of Contents Toc
Aligning Security Operations with the MITRE ATT&CK Framework

Aligning Security Operations with the MITRE ATT&CK Framework

By : Rebecca Blair
4.7 (18)
close
close
Aligning Security Operations with the MITRE ATT&CK Framework

Aligning Security Operations with the MITRE ATT&CK Framework

4.7 (18)
By: Rebecca Blair

Overview of this book

The Mitre ATT&CK framework is an extraordinary resource for all SOC environments, however, determining the appropriate implementation techniques for different use cases can be a daunting task. This book will help you gain an understanding of the current state of your SOC, identify areas for improvement, and then fill the security gaps with appropriate parts of the ATT&CK framework. You’ll learn new techniques to tackle modern security threats and gain tools and knowledge to advance in your career. In this book, you’ll first learn to identify the strengths and weaknesses of your SOC environment, and how ATT&CK can help you improve it. Next, you’ll explore how to implement the framework and use it to fill any security gaps you’ve identified, expediting the process without the need for any external or extra resources. Finally, you’ll get a glimpse into the world of active SOC managers and practitioners using the ATT&CK framework, unlocking their expertise, cautionary tales, best practices, and ways to continuously improve. By the end of this book, you’ll be ready to assess your SOC environment, implement the ATT&CK framework, and advance in your security career.
Table of Contents (18 chapters)
close
close
1
Part 1 – The Basics: SOC and ATT&CK, Two Worlds in a Delicate Balance
6
Part 2 – Detection Improvements and Alignment with ATT&CK
11
Part 3 – Continuous Improvement and Innovation

Index

As this ebook edition doesn't have fixed pagination, the page numbers below are hyperlinked for reference only, based on the printed edition of this book.

A

Access Control Lists (ACLs) 12, 86

Account Manipulation 47

Actions on Objectives control 77

Active Directory (AD) 50

Address Resolution Protocol (ARP) 61

Advanced Persistent Threat (APT) 48

after actions review/report (AAR) 122

alerts 104, 105, 111

alert triage feedback

turning, into something actionable 135-139

Amazon Web Services (AWS) 130

artificial intelligence (AI) 163

Atomic Red 16

attack trees 24, 32-34

ATT&CK

applying, to NOC environments 147-151

mapping, to compliance frameworks 152

using, to organizational policies and standards 153, 154

ATT&CK for Mobile 35

automation 155-158

B

BitDefencer 115

C

ChatGPT

examples 156, 157

chief information security officer (CISO) 122

cloud framework

techniques 45...

CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Aligning Security Operations with the MITRE ATT&CK Framework
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon