Skip to content

MITRE Att&ck integration with STRIDE threats #36

@saurabhsh5

Description

@saurabhsh5

What problem does your feature request solve?
Currently, the tool does a good job of decomposing the architecture and applying threats according to the STRIDE framework. This still leaves some gaps in determining the cybersecurity requirements that the process/implementation needs to adhere to to determine the risk response plan.

Solution:
The solution I am proposing is that we can create an additional layer of taxonomy of threats under STRIDE to identify the attacker's tactics and techniques which might be used to identify the right defenses. These can become the cybersecurity requirements for the process/implementation that we are threat modeling.

This combined process for threat modeling can be like:
The first step is to identify the process and map out the dataflows and interactions between them and the trust boundaries.[StrideGPT is capable of this]

Second, for each of the subsystems, enumerate a STRIDE matrix listing the mnemonics.
Third, the 12 ATT&CK tactics are tallied. Enumerated tactics are:
• Initial Access
• Execution
• Persistence
• Privilege Escalation
• Defense Evasion
• Credential Access
• Discovery
• Lateral Movement
• Collection
• Command and Control
• Exfiltration
• Impact

In Step 4, for each of the tactics within each of the STRIDE mnemonics, the applicable techniques are evaluated. For instance, for the STRIDE mnemonic of spoofing, the 12 tactics are evaluated for ATT&CK threat techniques that could result in spoofing against authenticity. In other words, Steps 2 through 4 are a process of elimination.
image

Advantages:

  1. Using consistent semantics and vocabulary to communicate threats.
  2. Understanding the adversary tactics which helps visualize the defenses to those threats.
  3. Use the open-source framework created by MITRE to educate the development teams about various threats and associated remediations.
  4. Identify cybersecurity requirements that help defend against multiple threats. [e.g.] Preventing Initial access can remediate other threats that are not directly related.

References:
https://blog.isc2.org/isc2_blog/2020/02/under-attack-how-mitres-methodology-to-find-threats-and-embed-counter-measures-might-work-in-your-or.html

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions