use mitre att&ck for stronger security safebreach · be carried out, to help defender stay...

2
Safebreach simulates attacks across the MITRE ATT&CK framework, to validate security policy, configuration and effectiveness. SAFEBREACH USE MITRE ATT&CK FOR STRONGER SECURITY Simulating Attacks SafeBreach simulates breach methods just like attackers - moving into environments, then spreading laterally, and finally exfiltrating data. This ensures that defenses are validated across the kill chain, to both ensure that security controls are working as expected at every stage of attack (cloud, perimeter, segmentation, endpoint, etc.), and to identify where defenses can be bolstered to most easily break the kill chain. These simulations are, in actuality, real attack methods - made safe because they are only executed against SafeBreach simulators, and never use real production data. Instead, SafeBreach simulates data – such as credit cards, social security numbers, passwords, and much more validating exfiltration techniques. SafeBreach also maps simulations and results to MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) knowledge base, and model for cyber adversary behavior. Enabling your security team to continuously measure your security defenses against the MITRE ATT&CK framework, by running all breach methods, testing against known threat groups, testing specific techniques ad-hoc and even building their own attack methods. Eliminate security surprises Increase security ROI Prove business value SafeBreach and MITRE Highest MITRE ATT&CK Framework coverage in the industry This means that organizations can prioritize/structure their investigation and remediation efforts based on MITRE’s phases of an adversary’s lifecycle and the platforms they are known to target. With SafeBreach, security teams can easily choose what simulations to run as a priority, to validate defenses broadly, or tactically.

Upload: others

Post on 19-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: USE MITRE ATT&CK FOR STRONGER SECURITY SAFEBREACH · be carried out, to help defender stay up-to-date, and prepared for proven, emerging, and new techniques in the wild. Contributors

Safebreach simulates attacks across the MITRE ATT&CK framework, to validate security policy, configuration and effectiveness.

SAFEBREACHUSE MITRE ATT&CK FOR STRONGER SECURITY

Simulating AttacksSafeBreach simulates breach methods just like attackers - moving into environments, then spreading laterally, and finally exfiltrating data. This ensures that defenses are validated across the kill chain, to both ensure that security controls are working as expected at every stage of attack (cloud, perimeter, segmentation, endpoint, etc.), and to identify where defenses can be bolstered to most easily break the kill chain.

These simulations are, in actuality, real attack methods - made safe because they are only executed against SafeBreach simulators, and never use real production data. Instead, SafeBreach simulates data –such as credit cards, social security numbers, passwords, and much more validating exfiltration techniques.

SafeBreach also maps simulations and results to MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) knowledge base, and model for cyber adversary behavior. Enabling your security team to continuously measure your security defenses against the MITRE ATT&CK framework, by running all breach methods, testing against known threat groups, testing specific techniques ad-hoc and even building their own attack methods.

Eliminate security surprises

Increase security ROI

Prove business value

SafeBreach and MITRE

Highest MITRE ATT&CK Framework coverage in the industry

This means that organizations can prioritize/structure their investigation and remediation efforts based on MITRE’s phases of an adversary’s lifecycle and the platforms they are known to target.

With SafeBreach, security teams can easily choose what simulations to run as a priority, to validate defenses broadly, or tactically.

Page 2: USE MITRE ATT&CK FOR STRONGER SECURITY SAFEBREACH · be carried out, to help defender stay up-to-date, and prepared for proven, emerging, and new techniques in the wild. Contributors

USE MITRE ATT&CK FOR STRONGER SECURITY

111 W. Evelyn AvenueSuite 117Sunnyvale, CA 94086408-743-5279www.safebreach.com

SafeBreach Labs, the security research arm of SafeBreach, and SafeBreach CTO Itzik Kotler, are also contributing partners to MITRE. SafeBreach Labs is a team of widely recognized ethical hackers, who have contributed to not only MITRE ATT&CK, but who have also contributed novel attack techniques at industry events and conferences such as Black Hack, DefCon, Hack in the Box, RSA, and more.

Always adding to the Hacker’s PlaybookTM of attack methods, SafeBreach Labs continues to work with MITRE to identify new ways that attacks can be carried out, to help defender stay up-to-date, and prepared for proven, emerging, and new techniques in the wild.

Contributors to the MITRE ATT&CK framework

Prioritizing Results and Remediating IssuesSimulating attacks mapped across the various phases of the MITRE ATT&CK framework is only the first stage. To truly stay ahead of data breaches, enterprises must continuously validate their defenses and remediate the critical issues that keep defenses from performing as intended. To help security teams identify where best to focus efforts, SafeBreach provides a visualized view of all successful attack paths - across the kill chain - and shows how individual attacks map to various phases of the ATT&CK framework.

With SafeBreach, security teams can simulate attacks associated with a specific threat group or run all attack simulations from the SafeBreachHacker’s PlaybookTM to understand the organization’s security posture against all known threat groups and malware.

Security policy and configurations are measured for effectiveness against attacks to prioritize remediation efforts to harden the enterprise against all threat groups.

The Breach Explorer helps identify where to easily break the kill chain