Reader small image

You're reading from  Aligning Security Operations with the MITRE ATT&CK Framework

Product typeBook
Published inMay 2023
PublisherPackt
ISBN-139781804614266
Edition1st Edition
Right arrow
Author (1)
Rebecca Blair
Rebecca Blair
author image
Rebecca Blair

Rebecca Blair currently serves as the SOC Manager at a Boston-based tech company, where she is in the process of building out a SOC team to include analyst workflows, playbooks, and processes. Also, she served at IronNet as the Director of SOC Operations, at Tenable Inc as a Test Engineer, and at the Army Research Lab as a Technical Compliance Lead, among other things. She has deep expertise in technology integrations and security operations and holds a BS degree from Norwich University in Computer Security and Information Assurance, an MS degree from the University of Maryland Global Campus in Cybersecurity and an MBA from Villanova University. She has found a niche in building SOC environments and maturing them in fast-paced environments.
Read more about Rebecca Blair

Right arrow

Applying ATT&CK to NOC environments

When looking at the ATT&CK framework, you can see that there are Enterprise, Mobile, and Industrial Control System frameworks for different purposes. Under the Enterprise matrices is Network matrix version 12, with the following sub-techniques:

  • Initial Access:
    • Exploit Public-Facing Application
    • Valid Accounts
  • Execution:
    • Command and Scripting Interpreter:
      • Network Device CLI
  • Persistence:
    • Modify Authentication Process:
      • Network Device Authentication
    • Pre-OS Boot:
      • ROMMONkit
      • TFTP Boot
    • Server Software Component:
      • Web Shell
    • Traffic Signaling:
      • Port Knocking
  • Privilege Escalation:
    • Valid Accounts
  • Defense Evasion:
    • Impair Defenses:
      • Impair Command History Logging
    • Indicator Removal on Host:
      • Clear Command History
      • Clear Network Connection History and Configurations
    • Modify Authentication Process:
      • Network Device Authentication
    • Modify System Image:
      • Patch System Image
      • Downgrade System Image
    • Network Boundary Bridging:
      • Network Address Translation Traversal
    • Pre-OS Boot...
lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Aligning Security Operations with the MITRE ATT&CK Framework
Published in: May 2023Publisher: PacktISBN-13: 9781804614266

Author (1)

author image
Rebecca Blair

Rebecca Blair currently serves as the SOC Manager at a Boston-based tech company, where she is in the process of building out a SOC team to include analyst workflows, playbooks, and processes. Also, she served at IronNet as the Director of SOC Operations, at Tenable Inc as a Test Engineer, and at the Army Research Lab as a Technical Compliance Lead, among other things. She has deep expertise in technology integrations and security operations and holds a BS degree from Norwich University in Computer Security and Information Assurance, an MS degree from the University of Maryland Global Campus in Cybersecurity and an MBA from Villanova University. She has found a niche in building SOC environments and maturing them in fast-paced environments.
Read more about Rebecca Blair