MITRE D3FEND and Azure Mappings: Counteracting ATT&CK Methods
MITRE D3FEND: the Counterpart to ATT&CK
If you've worked with MITRE ATT&CK, the D3FEND knowledge graph will look familiar. In a similar layout, it categorizes dozens of defense measures against various types of attacks. Across the top of the MITRE D3FEND matrix are several stages: Harden, Detect, Isolate, Deceive, and Evict. Listed down the columns are defensive processes and specific actions that can be done to achieve them (like the tactics and techniques of ATT&CK, respectively). When you click on any of the items in the matrix, you get an info page defining the term and how it works, with considerations noted as well as any digital artifact relationships or related ATT&CK techniques. Finally, references and supporting articles are listed and linked at the bottom for additional follow-up. [caption id="attachment_6620" align="aligncenter" width="1024"]
Microsoft's ATT&CK Mappings for Azure Security Center
Also this summer, around the time MITRE D3FEND was published, Microsoft announced mappings to MITRE ATT&CK from Azure Security Center. Mappings for D3FEND should be coming soon as well, although there isn't an announcement on the date yet. The mappings linking Azure's tools to ATT&CK techniques came as part of a project by the Center for Threat-Informed Defense. This project happened in recognition of the need for teams to map their security controls to ATT&CK, as well as the difficulty for them to do that on their own. With independent security controls (as opposed to features that rely on third party products or services), Azure was chosen as the first cloud platform to be mapped to ATT&CK. This results in a better understanding for Microsoft clients about the security controls that they have in Azure Security Center, as well as a clear visualization of where they stand against the techniques that cyber attackers use. [caption id="attachment_6627" align="aligncenter" width="768"]

More About MITRE D3FEND
MITRE ATT&CK and D3FEND both give cybersecurity teams clarity and resources to better strengthen their organizations. Any built-in mappings to them only make the process that much more workable. D3FEND is still relatively new and MITRE plans to continually build on it, and we can look forward to the ways Microsoft and other security companies link their technologies to it as well. For now, you can read more in-depth about how D3FEND was developed in MITRE's technical report on it. More of our recent blogs:Stay connected. Join the Infused Innovations email list!
Share this
You May Also Like
These Related Posts
What is MITRE ATT&CK?

What is MITRE ATT&CK?
October 18, 2021
3
min read
What is Content Disarm and Reconstruction (CDR)?

What is Content Disarm and Reconstruction (CDR)?
June 21, 2021
3
min read
Cyberattacks in 2021 Doubled Those of 2020

Cyberattacks in 2021 Doubled Those of 2020
December 6, 2021
5
min read
No Comments Yet
Let us know what you think