MITRE ATT&CK for ICS: Improving Threat Detection and Response in Industrial Control Systems
Dragos: ICS Cybersecurity via YouTube
Overview
Syllabus
Intro
What is MITRE?
Announcing ATT&CK for ICS
What is Dragos?
Agenda
What is ATT&CK?
Breaking Down ATT&CK
Motivation for ATT&CK for ICS
ATT&CK for ICS Technique Matrix
Process of Mapping to ATT&CK
Find the Behavior
Research the Behavior
Translate the Behavior into a Tactic
Figure Out What Technique Applies
Threat Intel Mapping
Assessing Coverage
Identify Adversary Methodology
ICS Access
Intrusion, Recon, & Control
Attack Delivery & Execution
ICS-Specific Impacts
Mapping ICS Threats to ATT&CK
Typical Defense Development
Alternative: Identify 'Weird'
Problem: No Context
Identifying Threat Behaviors
ATT&CK and Threat Behaviors
Complete Threat Detection
Continuous Development
Community Engagement
Continued Adversary Evolution
Mapping ATT&CK to ICS Threats
References & Resources
Taught by
Dragos: ICS Cybersecurity