Whenever I read about MITRE ATT&CK and D3FEND, a part of my brain goes, “Wh@t?” But another part is excited about such a comprehensive reference framework to nail down the moves that cyber attackers make—and to map responsive counteractions in defense. With funding from the NSA, MITRE D3FEND was released this summer to fill in that response part: it’s a knowledge graph made to correlate with and counter the attack techniques outlined in MITRE ATT&CK. Together the two create a detailed schema that outlines every step of various types of cyber attacks and the countermeasures to them. Microsoft has also created mappings with built-in Azure security controls that link with the ATT&CK techniques, and we can expect D3FEND mappings to come as well.
MITRE D3FEND: the Counterpart to ATT&CK
If you’ve worked with MITRE ATT&CK, the D3FEND knowledge graph will look familiar. In a similar layout, it categorizes dozens of defense measures against various types of attacks. Across the top of the MITRE D3FEND matrix are several stages: Harden, Detect, Isolate, Deceive, and Evict. Listed down the columns are defensive processes and specific actions that can be done to achieve them (like the tactics and techniques of ATT&CK, respectively). When you click on any of the items in the matrix, you get an info page defining the term and how it works, with considerations noted as well as any digital artifact relationships or related ATT&CK techniques. Finally, references and supporting articles are listed and linked at the bottom for additional follow-up.
This builds on MITRE’s ATT&CK framework and adds to security professionals’ toolkits much more thoroughly. ATT&CK was made to help defenders understand the nature of various kinds of attacks, which is an initial step toward a more informed response. Mitigation methods are included on the info pages of ATT&CK techniques, but only briefly. D3FEND expands the informational resources at security teams’ disposal. They can use it to identify which defense measures they are implementing and how well. It can also help them research security measures before making choices on investments and security actions.
Like ATT&CK, D3FEND is freely accessible to anyone who wants to use it—they need only visit its website—but the fullest use of its potential is with security tools or services mapping to its matrix.
Microsoft’s ATT&CK Mappings for Azure Security Center
Also this summer, around the time MITRE D3FEND was published, Microsoft announced mappings to MITRE ATT&CK from Azure Security Center. Mappings for D3FEND should be coming soon as well, although there isn’t an announcement on the date yet.
The mappings linking Azure’s tools to ATT&CK techniques came as part of a project by the Center for Threat-Informed Defense. This project happened in recognition of the need for teams to map their security controls to ATT&CK, as well as the difficulty for them to do that on their own. With independent security controls (as opposed to features that rely on third party products or services), Azure was chosen as the first cloud platform to be mapped to ATT&CK. This results in a better understanding for Microsoft clients about the security controls that they have in Azure Security Center, as well as a clear visualization of where they stand against the techniques that cyber attackers use.
The nicely colored mapping matrix shows levels of security coverage for different ATT&CK techniques. A color legend highlights which areas are most protected and where bigger vulnerabilities lie. This is helpful in assessing risks and also for testing and developing stronger defenses.
More About MITRE D3FEND
MITRE ATT&CK and D3FEND both give cybersecurity teams clarity and resources to better strengthen their organizations. Any built-in mappings to them only make the process that much more workable. D3FEND is still relatively new and MITRE plans to continually build on it, and we can look forward to the ways Microsoft and other security companies link their technologies to it as well. For now, you can read more in-depth about how D3FEND was developed in MITRE’s technical report on it.
More of our recent blogs: