Threats and the way we counter them have turn into key concerns in a system’s cybersecurity structure and design. This is applicable whether or not we’re designing a brand new system, addressing regulatory necessities to function in a selected mission surroundings, or simply working to satisfy organizational wants. Adoption of zero belief methods, safety by design steering, and DevSecOps are core to a system’s cybersecurity structure and design in each the private and non-private sector.
On this weblog put up, we focus on a way that mixes details about safety necessities, controls, and capabilities with evaluation relating to cyber threats to allow more practical risk-guided system planning. In plain language, it’s a method of making a crosswalk from system and safety necessities to threats. To stick to already established federal authorities insurance policies and tips whereas sustaining alignment with trade requirements, we used 4 main varieties of knowledge:
- Protection Data Methods Company (DISA) Management Correlations Identifiers (CCIs) are used to specific particular person technical or procedural necessities and the way they connect with higher-level management targets. CCIs are recognized with distinctive codes (e.g., CCI-000015) that are maintained by DISA. This creates a capability to hint safety necessities from their origin (e.g., laws, info assurance frameworks) to low-level implementation decisions, permitting organizations to readily display compliance with a number of info assurance frameworks. They’re primarily utilized by DoW companies and contractors, however they’re good for a lot of actions which might be widespread throughout different sectors, similar to compliance monitoring, auditing and reporting, and standardization. CCIs are mapped to a number of regulatory frameworks as nicely, which permits us to objectively roll up and examine associated compliance evaluation outcomes throughout disparate applied sciences. If you happen to work with Safety Technical Implementation Guides (STIGs) or NIST compliance frameworks, it’s seemingly you’ll encounter and use CCIs.
- Nationwide Institute of Requirements and Expertise (NIST) Safety and Privateness Controls for Data Methods and Organizations (SP 800-53) standardizes safety and privateness safeguards for info methods. This publication particulars controls which might be designed to guard the confidentiality, integrity, and availability of data methods. The management requirements are versatile and method safety with a risk-based focus. As a result of its large use within the authorities in addition to trade for outlining safety necessities for info methods and auditing them, it’s a nice baseline supply for greatest practices.
- The MITRE ATT&CK Framework is used closely to summary the conduct of menace actors in a method that makes info sharing potential, permits conduct emulation for inside coaching, and creates alternative for methods architects and safety practitioners to use strategic investments for the safety of interconnected methods. The framework is utilized in many merchandise and purposes throughout industries, and particular matrices have been created for industrial management methods, cellular units, and enterprise methods. On this work we primarily deal with the enterprise matrix as a result of it’s the most much like the environments that we developed this methodology for.
- MITRE Detection, Denial, and Disruption Framework Empowering Community Protection (D3FEND) Countermeasures act as a complement to the MITRE ATT&CK Framework. This just lately developed ontology gives a descriptive language for cybersecurity capabilities, primarily focused on the defender’s perspective, and a way for relating ATT&CK TTPs to D3FEND via semantic connections. To help use of the ontology, MITRE developed many assets that present connections to D3FEND and permit for the event of instruments like their D3FEND Profile Studio and D3FEND CAD. These instruments allow modeling of D3FEND, which permits us to specific the cyber terrain of curiosity in a fashion that connects it to the potential threats of curiosity.
Past the necessities for the info, we sought to make our method a repeatable course of to supply actionable info for leaders and analysts on the strategic, operational, and tactical ranges of a company.
Relationships and Linkages Between Information Sources
The info sources we have now used up to now are inclined to share not less than some commonalities (i.e., keys the place we will merge the info to achieve new insights). These keys should not typically precisely aligned. As famous, our work primarily makes use of the MITRE datasets for ATT&CK and D3FEND, together with their references to CCI and STIG knowledge.
Each the ATT&CK and D3FEND knowledge are represented computationally, in each instances utilizing monolithic JSON information: ATT&CK is a information base carried out in STIXv2 format, and the D3FEND knowledge is an ontology structured as a graph community with semantic details about the connection sort between nodes. There’s a CSV of D3FEND that we used to programmatically correlate CCIs and 800-53 controls and to allow visible inspection of the mappings alongside the way in which.
We developed capabilities in Python to create scripts that leveraged connections between ATT&CK, D3FEND, and different datasets. Our selection of Python enabled us to make use of present libraries similar to mitreattack-python, stix2, and rdflib. These libraries had been significantly useful in creating the scripts. There are a selection of points that come up in creating automated approaches together with, significantly, the shortage of actual string matches amongst knowledge sources, which made it tougher to develop linkages between knowledge sources. Label normalization and knowledgeable validation, particularly early within the course of of knowledge cleansing and assortment, can present nice advantages to the automating course of and validity of the ensuing crosswalk.
Transformation/Composition Instance
This instance highlights the method of aligning a set of instruments, strategies, and practices (TTPs) to a particular operational terrain. The cybersecurity capabilities deployed on a terrain should already be described with both D3FEND or NIST 800-53r5 controls to specific the effectiveness of these defensive countermeasures in opposition to the TTPs. Effectiveness, the diploma to which a functionality addresses a menace, is represented by 5 classes: coated (alerted + blocked), blocked, alerted, open, and unmapped. To comply with this course of
1) Analysts begin with a listing of TTPs of curiosity.
2) Use the MITRE D3FEND knowledge to assemble a listing of results every countermeasure has on that TTP. These results at the moment have 34 values, however for our functions we’re enthusiastic about simply three of them: block (we have now thwarted an assault), alert (we’re alerted that an assault is completed or underway), and open (we fail to be alerted to an assault of this sort).
3) Assign weights to the three results such that block is perfect, alert is OK, and open is the least fascinating.
4) For every TTP, kind the listing of countermeasure results by their weights. The general effectiveness of the countermeasure on that TTP is chosen from the best (greatest) weight.
5) From there, affiliate a listing of TTPs with every of the countermeasure effectiveness classes.
6) Use that info for no matter evaluation drove the train, similar to useful resource allocation for safety in improvement or operations.
Limitations With Our Transformation Method
As with many strategies that depend upon disparate assets and datasets, there are limitations to this method. We’re connecting many alternative assets, typically utilizing semantic mappings offered by different organizations. Whereas we should belief that the mappings had been created in a way that makes them correct, the bottom useful resource is trying to convey a barely totally different understanding of the data contained inside. These crosswalks make a generalization between the scopes of the assets, and if there occurs to be any nuances to the interpretation, the nuances might be inherited by the end result. To mitigate the potential for inheritance of inaccurate or misrepresentative info, an info safety skilled or material knowledgeable ought to go over the enter knowledge, the method, and the output to make sure the best diploma of accuracy.
Whereas our hope is that the method itself is steady, there are some issues inside which will result in misinterpretation. By utilizing the connections between D3FEND and ATT&CK as our main technique of expressing menace, there may be potential for simplification and abstraction of the menace panorama. TTPs should not an ideal illustration of what’s bodily occurring or being achieved by a menace actor. They provide a method of abstraction that in some instances permits lack of particulars. This could result in a danger from the misinterpretation of protection and variations in what is definitely discoverable. It’s at all times vital to validate outcomes and never merely depend upon a mapping to make sure information of an assault floor. Moreover, TTPs deal with identified behaviors. Because of this a novel method or assault may not be coated.
Sensible Use Circumstances for Terrain Risk Mapping
We’ve got recognized the next areas as potential areas that would use this course of:
- Potential menace/hole evaluation of cyber terrain. With this methodology we will examine the identified TTPs of an adversary to the TTPs that the cyber terrain is ready to detect or block.
- Safety funding and prioritization. By mapping many cyber terrain components, it’s potential to match them to one another and inform a risk-based method to enhancing safety.
- Cyber menace train improvement. Shortly examine what the pink and blue groups are able to to establish gaps. Determine prioritization of efforts, or duplicative efforts in an train. Present a way of making visualizations shortly to boost the train.
- Translation of necessities. Many audits require proof of implementation of controls in several frameworks; via this course of there’s a option to present protection or similarity between totally different audit necessities. This consists of turning into a supply of knowledge for prime worth asset audits.
- Resolution comparability. By using this mapping course of, it turns into potential to carry out a comparability of vendor choices, options, and proposed implementations on equal floor
- Dashboarding purposes. The mappings and relationships can be utilized to help with the creation or to tell cybersecurity dashboard purposes for executives or protection industrial base companions.
Along with use instances which might be particularly focused on the utility of the mapping course of for menace interpretation, it’s potential that this course of may result in enhancements in alignment of nomenclature, semantical precision, and different options of the fashions that will, in the long run, improve their utility in improvement and operations.
Increasing the Course of
Sooner or later, via the connections to ATT&CK, CCIs, and NIST 800-53r5, we will broaden this course of into totally different domains. Often a TTP doesn’t align with any artifacts related to D3FEND, CCI, or 800-53. This doesn’t imply that the TTP is irrelevant, simply that we don’t have a relationship expressed but. With additional improvement, it could be potential to scale back these gaps. There are additionally different related purposes that this course of can connect with.
The DoD has supplied steering for zero belief that MITRE has helpfully translated into NIST 800-53r5 controls. With this course of, safety architects and analysts would have the ability to develop a crosswalk that expresses zero belief in CCIs, ATT&CK, and D3FEND. Just like the Cloud Safety Alliance’s Cloud Management Matrix (CCM), having a way and gear that maps controls for a number of requirements and laws may simplify the auditing course of and make clear communications between groups with totally different priorities, similar to engineering and gross sales groups. We’re contemplating cross-walking NIST SP 800-160 Quantity 2, Revision 1 Creating Cyber-Resilient Methods: A Methods Safety Engineering Method to contemplate the resilience of a system as nicely. As well as, a connection to the Crucial Safety Controls developed by the Heart for Web Safety (CIS) may very well be helpful for potential relevance with the STRIDE-LM menace mannequin and trade compliance requirements.
Along with linking with different domains, there will be variations coming from the continuous enhancements of the prevailing knowledge sources. Within the model 18 launch of ATT&CK, for instance, it’s anticipated that TTPs will begin to embrace log areas as potential knowledge sources for figuring out TTPs. This may change ATT&CK detection steering right into a detection technique targeted system. This expands the power of ATT&CK in occasion correlation and together with D3FEND might help additional our makes an attempt to outline protection. With these updates, there could also be a option to higher outline the relevance of a TTP to a form of terrain.
By conserving these sensible concerns in thoughts—knowledge that’s publicly accessible, correct, present, and versatile—we lay a stable basis for locating significant connections with this methodology. When the supply materials is curated by reliable and educated custodians, its reliability boosts confidence within the connections which might be drawn and encourages broader adoption of these shared, public assets. Because the ecosystem of brazenly‑out there controls, necessities, and menace intelligence continues to evolve, this correlation methodology will turn into ever extra strong. This development guarantees improved use instances that streamline workflows for improvement groups, and allow stronger, extra resilient safety architectures, and system design.

