The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday announced the availability of a new guide for cyber threat intelligence analysts on the use of the MITRE ATT&CK framework.
The MITRE ATT&CK knowledge base of adversary tactics and techniques is widely used by security teams, but recent studies cited by CISA showed that many cybersecurity professionals don’t use it to its full potential.
That is why CISA has decided that it might be useful to share some guidance on the use of ATT&CK for threat intelligence.
The Homeland Security Systems Engineering and Development Institute (HSSEDI), which helped CISA develop the guidance, is a research and development center owned by the U.S. Department of Homeland Security and operated by MITRE.
The goal of the 20-page Best Practices for MITRE ATT&CK Mapping guide is to help analysts map attacker behaviors to the relevant ATT&CK techniques, both from cybersecurity reports and raw data.
“This Best Practices for MITRE ATT&CK Mapping guide provides network defenders with clear guidance, examples, and step-by-step instructions to make better use of MITRE ATT&CK as they analyze and report on cybersecurity threats,” CISA said. “This will improve defenders’ ability to proactively detect adversary behavior and supports robust, contextual bi-directional sharing of information to help strengthen the security of our systems, networks, and data.”
The complete Best Practices for MITRE ATT&CK Mapping guide is available on CISA’s website.