Back

Blogs

Ireland's Elections: What's next for climate pledges?

View All

Case Studies

Supporting BrainDrip LLC's Entry into the Hydrogen Market

View All

Upcoming Events

Webinars

Image of UI HUD screen tech system innovation conceptImage of UI HUD screen tech system innovation concept

Thoughts

How to Enhance your Cyber Resilience with MITRE ATT&CK Frameworks

11th Jul, 2024

In the evolving landscape of cybersecurity, the MITRE ATT&CK framework stands as a pivotal resource for understanding and addressing cyber threats. MITRE is a not-for-profit organisation that operates research and development centres sponsored by the US federal government. They developed the ATT&CK framework, which provides a globally accessible knowledge base of adversary tactics and techniques based on real-world observations.

In this blog we review the framework, its specialised versions for industrial control systems (ICS) and mobile environments, and introduce the new MITRE EMB3D framework for device risk profiling. We also outline how Gemserv leverages these resources to deliver bespoke cyber threat intelligence and advanced cybersecurity solutions to a diverse clientele.

What is the MITRE ATT&CK Framework?

The MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) framework is a comprehensive matrix of tactics and techniques used by threat actors during cyber operations. It serves as a foundation for developing threat models and methodologies in the private sector, security government, and the cybersecurity product and service community. The framework categorises tactics (the objectives behind cyberattacks) and techniques (how the objectives are achieved), providing security teams with a structured way to identify potential threats and develop effective defences.

Utilisation of the Framework

MITRE ATT&CK is used across various cybersecurity disciplines, including but not limited to:

  • Threat intelligence: Enhancing the understanding of how adversaries operate and adapting defences accordingly.
  • Security operations: Augmenting alert systems with context to detect and respond to malicious activity effectively.
  • Vulnerability management: Prioritising vulnerabilities based on the techniques used by adversaries to exploit them.
  • Red teaming: Improving testing by simulating known adversary behaviours and techniques.

MITRE ATT&CK for ICS

Recognising the unique threats to industrial environments, the MITRE ATT&CK for ICS framework adapts the general model to reflect the specialised systems, processes, and practices found in control systems environments. It provides ICS security professionals with information to defend critical infrastructure more effectively.

MITRE ATT&CK for Mobile

Similarly, the MITRE ATT&CK for Mobile framework is tailored to address the distinct security challenges in mobile environments, detailing specific tactics and techniques employed by adversaries to compromise mobile devices.

Gemserv’s Application of MITRE ATT&CK, ICS, and Mobile Frameworks

Gemserv uses the MITRE ATT&CK, ICS, and Mobile frameworks to conduct bespoke cyber threat intelligence operations. By leveraging these frameworks, Gemserv offers tailored threat modelling and analysis that align with the specific operational and technological environments of our clients. For instance:

  • Sector-Specific Threat Intelligence: Gemserv develops customised threat intelligence feeds that factor in the unique aspects of client environments, whether they operate in energy, healthcare, defence, finance, or manufacturing.
  • Simulated Adversary Engagement: Using the frameworks, Gemserv performs red team exercises to test the resilience of client systems against sophisticated attacks.
  • Incident Response Enhancements: We refine incident response strategies by mapping ongoing attacks to known adversary behaviours, enabling quicker and more effective mitigation.

Advanced Device Risk Profiling with MITRE EMB3D

The MITRE EMB3D (Evaluate, Measure, and Bolster Device Security) framework represents the latest evolution in risk assessment tools specifically designed for device security. It provides structured methodologies to evaluate the security of devices across all stages of their lifecycle. Gemserv utilises the EMB3D framework to undertake advanced device risk profiling, offering clients comprehensive assessments that include:

  • Device Vulnerability Evaluation: Analysing devices for vulnerabilities throughout their operational lifecycle, from initial design through deployment and maintenance.
  • Security Posture Measurement: Quantitatively measuring the security posture of devices against a set of established benchmarks and standards.
  • Mitigation Strategy Development: Assisting clients in developing robust mitigation strategies to address identified risks and bolster device security.

Conclusion

As cyber threats continue to evolve, the strategic application of frameworks like MITRE ATT&CK, become increasingly important. Gemserv’s expertise in integrating these frameworks into customised security services enables our clients to anticipate, prepare for, and mitigate potential cyber threats effectively. With the addition of the EMB3D framework, Gemserv is set to further enhance its capabilities in securing modern and complex device ecosystems, ensuring that our clients can trust their critical operations and data in an increasingly interconnected and digital world.

Authors

Ian Hirst

Partner, Cyber Threat Services

Read Bio