visit
“In a fight, your doubt is a target of enemy’s attack.”
― Toba Beta,
This is an exciting moment for us from different backgrounds, including public/ private sectors, system integrators, or security products/ services providers. Since it is the first time, a non-profit organization promotes a common framework — both attack and defense — for all of us.
stands for “MITRE Adversarial Tactics, Techniques, and Common Knowledge.” This framework is a selected knowledge base and model for attack behavior. It also contains the attack lifecycle, attack phases, and the OS platforms they are known to target.
Workbench allows users to explore, create, annotate, and share extensions of the ATT&CK knowledge base. Organizations or individuals can initialize their own instances of the application to serve as the centerpiece to a customized variant of the ATT&CK knowledge base, attaching other tools and interfaces as desired.
Open-source, API-driven platform to organize and manage all attack TTP-related threat intelligence makes this tool different. The time and effort spent trying to integrate the publicly-reported behavior with internal knowledge of attack TTP would be significantly reduced.
With ATT&CK Workbench, users can easily, according to one of the early adopters of the Workbench, :- create a local containerized instance of the ATT&CK knowledge base, and keep it updated automatically through the publicly maintained ATT&CK knowledge base;
- create and annotate objects within the ATT&CK knowledge base;
- submit enhancements efficiently to ATT&CK, as well as to other instances of the knowledge base;
- enable information sharing centers (ISACs) and information sharing organizations (ISAOs) to share their ATT&CK knowledge base enhancements with members.
Moreover, it provides a way for users to share their extensions with the ATT&CK community globally; finding others with a similar situation would improve the overall security posture and time to respond. Workbench will help both the red and blue teams enhance defense mechanisms, threat hunting, and much more.
It is the initial framework for setting the standard language for the blue team capabilities and technologies. , as it’s called, aims to complement the . While ATT&CK focuses on standardizing the offense TTP, D3FEND focuses on cyber defenses.
The National Security Agency funded this new D3FEND framework to define a structure for security artifacts for cybersecurity professionals and researchers. It can serve as a helpful guide for architecting, designing, and implementing cyber defenses.D3FEND is based, in part, on 500 countermeasure patents from the last two decades, . Because it is so detailed, the framework can guide architecting, designing, and deploying cybersecurity defenses.
D3FEND also establishes the language of cybersecurity defensive techniques and interprets previously unspecified relationships between defensive and offensive methods. There are five broad categories in the framework: harden, detect, isolate, deceive, and evict.
While ATT&CK focuses on Tactics, Techniques, and Procedures to describe a kill chain, D3FEND focuses on defensive practices and products by their digital artifacts. With each security product having various digital artifacts and each digital artifact being included in different products.Rather than relying on vendors’ definition of the “Next Generation Firewall,” cybersecurity professionals would know what each product could and could not do. For example, when a firewall gets a feature update and gains additional security capabilities.The firewall can work with EDR tools to provide XDR contextual information for the customer environment. For example, using the D3FEND framework would provide an easy view of the additional coverage.