A Threat-based Security Monitoring Approach Using Mitre ATT&CK Matrix

Presented at DeepSec 2019 „Internet of Facts and Fears“, Unknown date/time (Unknown duration).

Adversaries will always be able to compromise us, but that doesn't mean that the adversaries reach their goals. In order to prevent an adversary to be successful, the speed of our detection and response processes are key for a Security Operations Center (SOC). To support the SOC in this battle, the right tools and log sources need to be identified. This presentation tackles this problem by introducing a threat based security monitoring approach using the Mitre ATT&CK Matrix, which is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. This approach combines the information about the Advanced Persistent Threats (APT) in the Mitre ATT&CK Matrix with its used techniques resulting in a comprehensive list of tools and log sources needed for security monitoring. Subsequently, Sigma, as a universal language for detection rules, is introduced to detect the identified threats. The threat based security monitoring approach using Mitre ATT&CK Matrix is conducted based on a fictional company, evil bank.

Presenters:

  • Patrick Bareiß - Splunk
    Education: 2009 - 2013 B.Sc. Mechanical Engineering University Stuttgart 2013 - 2016 M.Sc. Mechanical Engineering Technical University Munich 2013 - 2019 B.Sc. Computer Science FernUniversität Hagen Work Experience: 2016 - 2017: Field Application Engineer for Hardware Security in Infineon Technologies 2017 - 2018: Cyber Security Integrator in Airbus CyberSecurity since 2018: Cyber Security Engineer in Airbus CyberSecurity since October 2019: Senior Security Researcher, Splunk

Links:

Similar Presentations: