Prioritize Known Exploited Vulnerabilites
Prioritize Known Exploited Vulnerabilities shows defenders how to take a threat informed approach to vulnerability management.
August 15, 2024
Defending Operational Technology (OT) with ATT&CK provides a customized collection of MITRE ATT&CK® techniques tailored to the attack surface and threat model for OT environments. Historical attacks against OT and adversarial techniques contained in ATT&CK for Enterprise, ATT&CK for ICS, and other relevant ATT&CK platforms were analyzed to identify and define a reference architecture and threat collection of techniques adversaries could use within an IT/OT hybrid architecture. The resultant resources can be used by organizations that use OT to evaluate and employ security controls for real-world adversary behaviors targeting those environments.
Organizations need to understand the techniques adversaries use against OT and the enterprise systems that manage OT.
Develop a straightforward approach to understanding and working with the techniques applicable to OT.
Organizations defend against the full set of techniques against OT.
Prioritize Known Exploited Vulnerabilities shows defenders how to take a threat informed approach to vulnerability management.
The Security Stack Mappings – Hardware-Enabled Defense project demonstrates full stack threat-informed defense, from the hardware board to the …
Summiting the Pyramid (STP) creates a methodology to score analytics against the pyramid of pain, helping defenders create more robust detections …
Sign up for the Center's "Stay Informed" newsletter to get notified for new project releases and upcoming events.