-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Lp changes #12
Lp changes #12
Changes from 15 commits
8b5ca0c
bff9a55
5d06288
0d4d061
1c0cd01
0e7a6b9
14e81ba
416048b
91a02cc
a1a883b
341a2f2
b27dd68
467420c
6bec77f
cebc0b7
6ab3577
3279c14
463b824
c09e1a9
aa78187
406616a
b312bf2
c160a23
8cfe228
5e063e5
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -4,6 +4,13 @@ Introduction | |
Background | ||
---------- | ||
|
||
Adversaries are constantly evolving their attacks, driving up the cost of intrusions. | ||
Consequently, defenders must continue to protect against an increasing amount of | ||
adversary techniques and behaviors. Despite their best efforts, it is not possible to | ||
defend against all potential scenarios. This raises the questions, “How many MITRE | ||
ATT&CK techniques apply to the average organization?” and “Which techniques does an | ||
organization realistically need to defend against?” | ||
|
||
MITRE’s Center for Threat-Informed Defense (the Center) began addressing these questions | ||
with the Sightings Ecosystem. The project focused on creating an anonymous, | ||
community-sourced repository of technique detections to identify when and where ATT&CK | ||
|
@@ -22,22 +29,17 @@ organization based on location, industry sector, and deployed platforms. | |
Framing our Analysis | ||
-------------------- | ||
|
||
Adversaries are constantly evolving their attacks, driving up the cost of intrusions. | ||
Consequently, defenders must continue to protect against an increasing amount of | ||
adversary techniques and behaviors. Despite their best efforts, it is not possible to | ||
defend against all potential scenarios. This raises the questions, “How many MITRE | ||
ATT&CK techniques apply to the average organization?” and “Which techniques does an | ||
organization realistically need to defend against?” | ||
While our volume of data has increased significantly, there are caveats to keep in mind when reading our results. Primarily, we are limited to the data we were provided. While getting the data straight from vendors is beneficial, it introduces biases. To ameliorate this bias, we have a diverse set of providers and a large data set, which reduces some skewing within the data. | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Can you please word wrap the text? I can show you how to set this up in Visual Studio Code if you don't have it already. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. It looked like I had word wrap on already, but let me know if what I did didn't fix the issue. |
||
|
||
Additionally, the quality of the data is limited to what the vendors generate. We | ||
provide a data model for submitting data, but it is up to the vendors which fields to | ||
submit to us. While some fields are required, such as technique and data source, others | ||
are optional, such as region or privilege level. We also place trust in our contributors | ||
submit to us. While some fields are required, such as technique and data source; others | ||
are optional, such as region or privilege level. We also trust our contributors | ||
to provide complete and accurate data. Mapping observed events to adversary techniques | ||
is an art form and therefore has some degree of subjectivity. Where an adversary is | ||
using PowerShell to run an executable with a valid account, one analyst may mark the | ||
event as PowerShell Scripting, while another might mark it as Valid Accounts; it depends | ||
on the context and how the analyst views it. One mitigation for this bias is to mark the | ||
on the context and the analyst's perspective. One mitigation for this bias is to mark the | ||
data with all relevant techniques (both PowerShell and Valid Accounts). | ||
|
||
Most of the events in our dataset are machine-generated and are not manually validated. | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
As we discussed on Slack, I don't want to offer a standalone PDF. Please remove this from the PR.
If the PDF is a meaningful deliverable to you, then let's work on setting up Sphinx to support PDF generation in a separate PR.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I removed the file, but I think having a pdf option is valuable for individuals who work in classified environments and can't access the website.