ATTACK SIMULATION USING MITRE ATT&CK
The knowledge base of adversary tactics and techniques known as MITRE ATT&CK can be very useful in breach and attack simulation. The hundreds of techniques defined and described help all practitioners of security understand what needs to be monitored, detected and defended against. More importantly, preventive defenses need to allow for the possibility of combinations of these attack methods. XM Cyber incorporates MITRE ATT&CK within its catalog of simulations and provides reference links to the MITRE ATT&CK library in remediation reports.
ALIGNMENT TO THE MITRE ATTACK FRAMEWORK
The XM Cyber platform is aligned to the MITRE ATT&CK framework and shows the relevant ATT&CK techniques at each step of the attack. The ATT&CK framework is a great learning tool to help security teams understand how adversaries work and an excellent way to create a common language in the industry.
XM CYBER & MITRE ATT&CK
- Validation Module– Customers can perform on-demand exploitation of their networks and hosts, using MITRE ATT&CK™ and threat actor aligned tactics, techniques and procedures (TTP).
- MITRE ATT&CK™ Framework Alignment– XM Cyber is now aligned with MITRE ATT&CK™, a curated knowledge base and model for cyber adversary behavior
- Includes updating of the MITRE ATT&CK framework to include cloud-specific attack techniques. XM Cyber is the first and only BAS solution that can identify and recommend remediation for hybrid environment risks
- Prioritized remediation reports include links to relevant MTRE ATT&CK techniques