/
Cyber Resilience

Building Cyber Resilience? Use the MITRE ATT&CK Framework as Your North Star

This blog will focus on cyber resilience and detection. Cyber resilience can be in many areas, but this counter blog series will focus on techniques and tactics to help your organization stop an active breach as well as learn what to put in place to detect the breach as quickly as possible. I'll be discussing how Illumio Zero Trust Segmentation be used for both detection and protection.

Let's start at the beginning of how we can achieve this with Illumio and using existing toolsets you may have in your organization. With the right tools, you can be ready to prevent, detect, and respond.

Shut the front door!: Securing your critical assets

To start, let's talk about a real-world example.

Everyone has something very special to them in their house. This could be a family heirloom, piece of jewelry, or a few gold bars, if you're lucky. For this example, we are going to call them “critical assets.” These special items is always on your mind; it needs to be protected at all costs.

What do you we traditionally do to protect our critical assets?

Our homes have walls, windows, and a door to protect from rain, wind, and animals. If we think of this in a percentage, say this keeps about 50 percent of risk to your critical assets away.

The doors and windows are nice to have, but they can still be opened at any time - we add locks to them to keep the next 10 percent of risk out. We are getting a more secure perimeter now, but like anything, we can improve it!

Next, we need to see who is outside of our house, if they are sneaking up to the door or window at night. We put in some lighting with motion sensors to go off when they detect movement. Now we are getting up another 2 percent more protection, and slowly but surely, we are getting there.

But we can't be up all night watching for the lights to turn on. We want to be notified and record it when it does happen. Off we go to the internet - a few clicks later, and the next day a new camera system shows up with motion-activated recording, a doorbell video camera, and door and window sensors! Now we are up to 70 percent coverage.

Your home's perimeter is getting harder to breach, so you assume your critical assets are protected safely.

But when you come back home one day to find the backdoor has been left open by accident, you panic that your critical assets have been taken. This time, thankfully, nothing happened. Phew, safe this time - but it gets you thinking. If someone had found your home's back door open, could they have taken your critical assets? You realize securing your home against a breach isn't finished yet.

If your critical assets are only 70 percent secured, how can you completely protect your home from a breach? Let me be the first to bust your bubble: You won't, and you can't. Breaches are inevitable.

To prepare for when a breach does occur, you need to segment out your critical assets from the rest of the house. This ensures that when one part of your house gets breached, you can shut the door on your critical assets and ensure the bad actor isn't able to get to them.

By now, you've hopefully started to see similarities between the above example and your organization's cybersecurity strategy. We will go through how these steps tie to normal security best practices everyone should be following for cyber resilience and detection.

Using the MITRE ATT&CK framework to build cyber resilience

Paul's post referenced the MITRE ATT&CK framework and for good reason. It is a blueprint of how attackers think, what steps they will take to get to your critical assets, and how to stop them during each phase.

Security teams can use this framework to learn how to protect their organization from the attack patterns that bad actors use.

 

mitre-att&ck-framework

Attacks reaching the far right of the framework below (Exfiltration and Impact) usually shows an organization early in their security maturity.

If an attacker is getting to the Exfiltration phase, your organization is in a reactive mindset to security breaches. You are likely hoping your EDR tools alone can stop a breach when it happens - but breaches rarely work that way.

 

security-maturity-model

At what level is your organization's security maturity? Image by CISOSHARE.

When a breach does occur, stopping it as early as possible should be the goal - and Zero Trust Segmentation can help pick up where EDR tools end.

In fact, according to offensive security firm Bishop Fox, combining detection and response with Illumio radically reduced an attacker from spreading while detecting 4 times faster.

Where to next? Improving your organization's security maturity

In this series, we will respond to Paul's series and start outlining steps to improve your organization's security maturity with help from cybersecurity best practices and Illumio Zero Trust Segmentation. While hackers are always evolving and changing how they attack, these blue team tactics can help you stand the test of time.

Before the next blog post, think about what the first step to improving your organization's cyber resilience might be, and make some mental notes on your organization's current security status. You can reference these as we go to see how you stack up.

Keep reading next month to learn how to stop breaches from spreading through your network as quickly as possible.

Want to learn more about Illumio Zero Trust Segmentation? Contact us today for a consultation and demo.

Related topics

No items found.

Related articles

Data Center and Cloud Security — Why We Need a Revolution
Cyber Resilience

Data Center and Cloud Security — Why We Need a Revolution

Revolutions happen for good reason. They’re the result of a divergence of expectations and reality causing pent-up frustration that pushes the need for change. Old ways no longer align with new requirements and pressure reaches a boiling point where there is no other option but to make that change.

Dispelling Host-Based Security Myths in Asia Pacific
Cyber Resilience

Dispelling Host-Based Security Myths in Asia Pacific

Learn how Zero Trust focused host-based micro-segmentation solutions can boost your security practices in APAC and throughout the world.

Take Me to Your Domain Controller: Protections & Mitigations Using Zero Trust Tools
Cyber Resilience

Take Me to Your Domain Controller: Protections & Mitigations Using Zero Trust Tools

In part 1 of this blog series, we looked at how discovery methods can be used in an initial compromise.

No items found.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?