Aligning Security Operations with the MITRE ATT&CK Framework: Level up your security operations center for better security
暫譯: 將安全運營與MITRE ATT&CK框架對齊:提升您的安全運營中心以增強安全性
Blair, Rebecca
- 出版商: Packt Publishing
- 出版日期: 2023-05-19
- 售價: $1,500
- 貴賓價: 9.5 折 $1,425
- 語言: 英文
- 頁數: 192
- 裝訂: Quality Paper - also called trade paper
- ISBN: 1804614262
- ISBN-13: 9781804614266
-
相關分類:
資訊安全
立即出貨 (庫存=1)
商品描述
Align your SOC with the ATT&CK framework and follow practical examples for successful implementation
Purchase of the print or Kindle book includes a free PDF eBook
Key Features
- Understand Cloud, Windows, and Network ATT&CK Framework using different techniques
- Assess the attack potential and implement frameworks aligned with Mitre ATT&CK
- Address security gaps to detect and respond to all security threats
Book Description
The Mitre ATT&CK framework is an extraordinary resource for all SOC environments, however, determining the appropriate implementation techniques for different use cases can be a daunting task. This book will help you gain an understanding of the current state of your SOC, identify areas for improvement, and then fill the security gaps with appropriate parts of the ATT&CK framework. You'll learn new techniques to tackle modern security threats and gain tools and knowledge to advance in your career.
In this book, you'll first learn to identify the strengths and weaknesses of your SOC environment, and how ATT&CK can help you improve it. Next, you'll explore how to implement the framework and use it to fill any security gaps you've identified, expediting the process without the need for any external or extra resources. Finally, you'll get a glimpse into the world of active SOC managers and practitioners using the ATT&CK framework, unlocking their expertise, cautionary tales, best practices, and ways to continuously improve.
By the end of this book, you'll be ready to assess your SOC environment, implement the ATT&CK framework, and advance in your security career.
What you will learn
- Get a deeper understanding of the Mitre ATT&CK Framework
- Avoid common implementation mistakes and provide maximum value
- Create efficient detections to align with the framework
- Implement continuous improvements on detections and review ATT&CK mapping
- Discover how to optimize SOC environments with automation
- Review different threat models and their use cases
Who this book is for
This book is for SOC managers, security analysts, CISOs, security engineers, or security consultants looking to improve their organization's security posture. Basic knowledge of Mitre ATT&CK, as well as a deep understanding of triage and detections is a must.
商品描述(中文翻譯)
對齊您的 SOC 與 ATT&CK 框架,並遵循實用範例以成功實施
購買印刷版或 Kindle 書籍包括免費 PDF 電子書
主要特點
- 使用不同技術了解 Cloud、Windows 和 Network ATT&CK 框架
- 評估攻擊潛力並實施與 Mitre ATT&CK 對齊的框架
- 解決安全漏洞以檢測和應對所有安全威脅
書籍描述
Mitre ATT&CK 框架是所有 SOC 環境的卓越資源,然而,確定不同用例的適當實施技術可能是一項艱鉅的任務。本書將幫助您了解您 SOC 的當前狀態,識別改進的領域,然後用 ATT&CK 框架的適當部分填補安全漏洞。您將學習應對現代安全威脅的新技術,並獲得推進您職業生涯的工具和知識。
在本書中,您將首先學習識別您 SOC 環境的優勢和劣勢,以及 ATT&CK 如何幫助您改善它。接下來,您將探索如何實施該框架並利用它填補您已識別的任何安全漏洞,加快過程而無需任何外部或額外資源。最後,您將窺探使用 ATT&CK 框架的活躍 SOC 管理者和從業者的世界,解鎖他們的專業知識、警示故事、最佳實踐以及持續改進的方法。
在本書結束時,您將準備好評估您的 SOC 環境,實施 ATT&CK 框架,並在您的安全職業中進一步發展。
您將學到的內容
- 更深入了解 Mitre ATT&CK 框架
- 避免常見的實施錯誤並提供最大價值
- 創建高效的檢測以與框架對齊
- 實施檢測的持續改進並檢視 ATT&CK 對應
- 發現如何利用自動化優化 SOC 環境
- 檢視不同的威脅模型及其用例
本書適合誰
本書適合 SOC 管理者、安全分析師、CISO、安全工程師或安全顧問,旨在改善其組織的安全態勢。必須具備基本的 Mitre ATT&CK 知識,以及對分流和檢測的深入理解。
目錄大綱
1. SOC Basics – Structure, Personnel, Coverage, and Tools
2. Analyzing Your Environment for Potential Pitfalls
3. Reviewing Different Threat Models
4. What is the ATT&CK Framework?
5. A Deep Dive into the ATT&CK Framework
6. Strategies to Map to ATT&CK
7. Common Mistakes with Implementation
8. Return on Investment Detections
9. What Happens After an Alert is Triggered?
10. Validating Any Mappings and Detections
11. Implementing ATT&CK in All Parts of Your SOC
12. What's Next? Areas for Innovation in Your SOC
目錄大綱(中文翻譯)
1. SOC Basics – Structure, Personnel, Coverage, and Tools
2. Analyzing Your Environment for Potential Pitfalls
3. Reviewing Different Threat Models
4. What is the ATT&CK Framework?
5. A Deep Dive into the ATT&CK Framework
6. Strategies to Map to ATT&CK
7. Common Mistakes with Implementation
8. Return on Investment Detections
9. What Happens After an Alert is Triggered?
10. Validating Any Mappings and Detections
11. Implementing ATT&CK in All Parts of Your SOC
12. What's Next? Areas for Innovation in Your SOC