Security Stack Mappings – Hardware-Enabled Defense
The Security Stack Mappings – Hardware-Enabled Defense project demonstrates full stack threat-informed defense, from the hardware board to the …
July 28, 2022
The Cloud Analytics project sought to advance the state of the practice by developing a blueprint for writing analytics for cloud platforms. To create the blueprint, the team “learned by doing” – exercising adversary behaviors, developing analytics, and refining them. Lessons learned were gathered along the way and incorporated into the analytics blueprint shared with the community.
Defenders achieve sufficient visibility of adversary behaviors in on-premises environments, but they struggle to achieve comparable visibility in cloud environments.
Developed a foundational set of cloud analytics for key TTPs and captured best practices and lessons learned in an analytics blueprint document.
Improves defenders’ ability to develop analytics to detect adversary behaviors in cloud environments.
The Security Stack Mappings – Hardware-Enabled Defense project demonstrates full stack threat-informed defense, from the hardware board to the …
Summiting the Pyramid (STP) creates a methodology to score analytics against the pyramid of pain, helping defenders create more robust detections …
A collaboration with MITRE ATLAS™ to advance security for AI–enabled systems that takes a threat-informed approach, enables rapid exchange of new …
Sign up for the Center's "Stay Informed" newsletter to get notified for new project releases and upcoming events.