Are there any best practices out there to connect #MITRE #ATT&CK and #D3FEND while doing a #Threatmodel in a #TOGAF #ADM security architecture?

How do I go from »There is an attack vector!« to »The developers closed their tickets which implement all relevant counter measures«?

Does #SABSA or #PASTA offer any insight here?

📰 MITRE Extends D3FEND Cybersecurity Framework to Operational Technology (OT)

MITRE has extended its D3FEND framework to Operational Technology (OT)! 🛡️ Funded by the NSA, the new knowledge base provides a standard for defending critical infrastructure and cyber-physical systems. 🏭 #OTsecurity #ICS #D3FEND #Cybersecurity

🔗 https://cyber.netsecops.io/articles/mitre-extends-d3fend-cybersecurity-framework-to-operational-technology-ot/?utm_source=mastodon&utm_medium=soc…

MITRE Extends D3FEND Cybersecurity Framework to Operational Technology (OT)

MITRE extends its D3FEND cybersecurity framework to include Operational Technology (OT), creating a standardized knowledge base for defending critical infrastructure and industrial control systems.

CyberNetSec.io
How to Build D3FEND Graphs with D3FEND CAD

Explore the benefits of cybersecurity modeling using D3FEND CAD. Learn to create structured, insightful graphs that enhance decision-making and analysis.

I missed this but wow, MITRE D3FEND announced their 1.0 release. Big milestone for them
#MITRE #D3FEND #ThreatIntel
https://d3fend.mitre.org/blog/d3fend-1.0/
D3FEND 1.0 General Availability

D3FEND 1.0 is here and we are excited to see how you put D3FEND into action!

#D3FEND - A knowledge graph of #cybersecurity countermeasures https://d3fend.mitre.org/
MITRE D3FEND Knowledge Graph

D3FEND is a knowledge base of cybersecurity countermeasure techniques. In the simplest sense, it is a catalog of defensive cybersecurity techniques and their relationships to offensive/adversary techniques. The primary goal of the initial D3FEND release is to help standardize the vocabulary used to describe defensive cybersecurity technology functionality.

ATT&CK Workbench is an impressive piece of software for #threatintel, the missing piece to actually make the topologies usable.

https://mitre-engenuity.org/cybersecurity/center-for-threat-informed-defense/our-work/attck-workbench/

I hope a #D3FEND integration will be available in the future.

ATT&CK Workbench

The Workbench project expands the functionality of the current platform to enable teams to explore, create, annotate, and share extensions of the ATT&CK knowledge base.

MITRE Engenuity

@shellsharks So my team has been thinking of a few ways of mapping controls to TTPs. Best route for now seems to take our Single Process Inventory (SPI) and find correlating controls in place.
Then using MITRE D3FEND, take ATT&CK techniques in our reporting and map to D3FEND techniques that make logical sense for us to implement. Ex. T1134 - Access Token Manipulation has some D3FEND techniques like System Call Analysis, Process Spawn Analysis, Mandatory Access Control.
https://d3fend.mitre.org/offensive-technique/attack/T1134/

NIST 800-53 Rev. 5 also includes a spreadsheet for mapping controls to TTPs although it's kept very vague. They do include a Navigator layer which can be useful to overlay with whatever ATT&CK techniques you're focused on.

https://mitre-engenuity.org/cybersecurity/center-for-threat-informed-defense/our-work/nist-800-53-control-mappings/
#ThreatIntel #MITRE #D3FEND

Offensive Technique Details | MITRE D3FEND™