We recommend regular testing and verification of your organization's security and cyber security posture based on cyber attackers' strategies, techniques, and procedures as mapped in MITRE ATT&CK® for Enterprise.
Here's what to do:
1. Select the category (e.g., persistence or privilege escalation) and the technique or techniques listed in MITRE ATT&CK® for Enterprise
2. Compare your security technology and security to that described in this technique or techniques.
3. Real-test your technology and security against this technique or techniques.
4. Comprehensively analyse the performance of your detection and prevention technologies based on such a test.
5. Apply the test outputs and make appropriate adjustments and upgrades to your security processes and technologies.
We recommend repeating it for other techniques listed in each category of MITRE ATT&CK® for Enterprise.
Comentarios