The CISO’s Guide to Cloud Security Using ATT&CK
How to identify, validate, and optimize native security controls within major public cloud platforms.
Achieve cloud security readiness.
The transition to the cloud brings great promise to the practice of cybersecurity, but only if security teams know how to make the most of their cloud investments. Major cloud service providers have dozens of native security controls within them to improve cybersecurity. Yet too often security teams don’t know what they are, how they work, or how to validate them.
New research from MITRE Engenuity’s Center for Threat-Informed Defense helps solve this problem. It maps the cloud security controls native to Azure and AWS to the adversary tactics, techniques, and procedures (TTPs) in the MITRE ATT&CK framework, and then scores the effectiveness of each cloud platform in mitigating adversary TTPs. The net result: security teams can now map the security controls within Azure and AWS to the threat behaviors in ATT&CK to achieve cybersecurity readiness.
Building on the Center’s research, AttackIQ has created templates and scenarios within the Security Optimization Platform to emulate adversary attacks to validate cloud security controls at scale, continuously, and in an automated fashion to achieve cybersecurity readiness.
With this new CISO’s Guide to Cloud Security with ATT&CK, you will be able to:
- Map native cloud controls in major cloud providers to ATT&CK
- Identify the cloud security controls most important to your organization
- Achieve cloud security readiness through continuous security control validation.
Fill out the form to the right to download the new guide.