“You cannot stop a determined threat actor
from pwning you.” –quote by me, when telling
IT/cybersecurity pros to take other steps to plan
for the pain.
Applying the MITRE CREF.pptx
ATT&CK® knowledgebase adversary
tactics and techniques
D3FEND™ knowledgebase of defensive
countermeasures
Engage™ framework for adversary
engagement and deception
CALDERA™ framework for automated
adversary/red-team emulation
Cyber Resiliency
Engineering
Framework (CREF)
framework for cyber resilience
design
Applying the MITRE CREF.pptx
Applying the MITRE CREF.pptx
Applying the MITRE CREF.pptx
310 pages
78 pages
MITRE
NIST
Applying the MITRE CREF.pptx
Bending,
but not
breaking.
1
Withstanding
an attack or
outage AND
recovering
quickly.
2
Bouncing
back from
an attack.
3
Applying the MITRE CREF.pptx
Applying the MITRE CREF.pptx
Cybersecurity
Cyber
Resilience
Anticipate Withstand Recover Adapt
Anticipate Withstand Recover Adapt
IDENTIFY PROTECT DETECT RESPOND RECOVER
MITRE CREF
NIST CSF
Anticipate Identify Protect Detect Respond Withstand Recover Adapt
MITRE CREF & NIST CSF Together <3
CREF CREF CREF CREF
CSF CSF CSF CSF
Applying the MITRE CREF.pptx
Incident
Response
Managed IT
Operations
Managed
Cybersecurity
Insights
The VEEAM Story and Threat Actors:
• Run “kill scripts” on target hosts
to disable VSS, delete VSS
snapshots
• Delete/encrypt backups
• Steal credentials for SAN and
delete SAN snapshots
• Encrypt VMware ESXi hosts
• Attack DR sites and cloud
resources over VPN from
production network
VLAN 101
I’m simple, but flat
and easy to attack.
The VEEAM Story: Veeam (on-premises backup software and
infrastructure) was being deleted or encrypted in ransomware attacks.
• Outcome: All servers, backup infrastructure, and storage is accessible to
attacker and encrypted/deleted in ransomware attack.
VLAN 101
I’m simple, but
flat and easy to
attack.
VLAN 101 VLAN 102
1 3
2 4
5
6
7
8
PWR
FAN
ALM
STS
HA
TMP
MGT CONSOLE USB
9 11 13 15
10 12 14 16
17
18
HA1
HA2
PA-3060
Firewall: Block inter-VLAN traffic for 101 and
102.
Hole punched into
VLAN for admin
access.
MITRE|CREF Navigator™
→Re-Architect
→→Predefined Segmentation
The VEEAM Story:
• We disjoined Veeam Backup
Server from domain (so attacker
cannot access it by
compromising Active Directory).
• We segmented the network.
• Outcome: Improved restorability,
but administrative access to
VLAN102 can still be
compromised if attacker
compromises admin PC.
VLAN 101 VLAN 102
1 3
2 4
5
6
7
8
PWR
FAN
ALM
STS
HA
TMP
MGT CONSOLE USB
9 11 13 15
10 12 14 16
17
18
HA1
HA2
PA-3060
Firewall: Block inter-VLAN
traffic for 101 and 102.
Hole
punched
into VLAN
for admin
access.
MITRE|CREF Navigator™
→Re-Architect
→→Predefined Segmentation
VLAN 101 VLAN 102
1 3
2 4
5
6
7
8
PWR
FAN
ALM
STS
HA
TMP
MGT CONSOLE USB
9 11 13 15
10 12 14 16
17
18
HA1
HA2
PA-3060
Firewall: Block inter-VLAN traffic for 101
and 102.
AWS
Azure
MITRE|CREF Navigator™
→Reconstitute → Redundancy
→→Protected Backup &
Restore
The VEEAM Story:
• We added immutable
cloud storage for Veeam
scale sets.
• Outcome: If on-premises
infrastructure is
completely compromised,
we still have a recovery
path.
VLAN 101 VLAN 102
1 3
2 4
5
6
7
8
PWR
FAN
ALM
STS
HA
TMP
MGT CONSOLE USB
9 11 13 15
10 12 14 16
17
18
HA1
HA2
PA-3060
Firewall: Block inter-VLAN
traffic for 101 and 102.
AWS
Azure
MITRE|CREF Navigator™
→Reconstitute → Redundancy
→→Protected Backup & Restore
VLAN 101 VLAN 102
1 3
2 4
5
6
7
8
PWR
FAN
ALM
STS
HA
TMP
MGT CONSOLE USB
9 11 13 15
10 12 14 16
17
18
HA1
HA2
PA-3060
Firewall: Block inter-VLAN traffic for
101 and 102.
AWS
Azure
DRaaS
Cloud
Credential & Key
Vault
MITRE|CREF Navigator™
→Reconstitute → Redundancy
→→Protected Backup & Restore
The VEEAM Story:
• We used a key vault for AWS
and Azure storage keys and
associated creds to prevent
credential theft. (Admins don’t
keep the passwords/keys.)
• We added alternate, slower
immutable cloud backup of
critical VMs as a failsafe.
• Outcome: Protection of
backup resources and
recovery paths.
VLAN 101 VLAN 102
1 3
2 4
5
6
7
8
PWR
FAN
ALM
STS
HA
TMP
MGT CONSOLE USB
9 11 13 15
10 12 14 16
17
18
HA1
HA2
PA-3060
Firewall: Block inter-VLAN
traffic for 101 and 102.
AWS
Azure
DRaaS
Cloud
Credential &
Key Vault
MITRE|CREF Navigator™
→Reconstitute → Redundancy
→→Protected Backup & Restore
Prevent or
Avoid
Prepare
Continue Constrain
Reconstitute Understand
Transform Re-Architect
Applying the MITRE CREF.pptx
Applying the MITRE CREF.pptx
Applying the MITRE CREF.pptx
Applying the MITRE CREF.pptx
Focus on common critical assets
Focus
Support agility and architect for adaptability
Support
Reduce attack surfaces
Reduce
Assume compromise
Assume
Expect adversaries to evolve
Expect
Applying the MITRE CREF.pptx
Applying the MITRE CREF.pptx

More Related Content

PDF
AI in Networking: Transforming Network Operations with Juniper Mist AIDE
PDF
Understanding SASE
PDF
What is SASE
PDF
L'automatisation dans les reseaux d'entrerprise
PPTX
What is SASE and How Can Partners Talk About it?
PDF
The Data Distribution Service
PDF
Cloud computing
PDF
Sync on TAP - Syncing infrastructure with software
AI in Networking: Transforming Network Operations with Juniper Mist AIDE
Understanding SASE
What is SASE
L'automatisation dans les reseaux d'entrerprise
What is SASE and How Can Partners Talk About it?
The Data Distribution Service
Cloud computing
Sync on TAP - Syncing infrastructure with software

What's hot (20)

PPT
Etude et mise en place d’un VPN
PDF
Atrinet - Lifecycle Service Manager
PDF
Colt's evolution from MPLS to Cloud Networking
PPTX
Soutenance de stage
PPTX
Submarine line termination equipment (SLTE) for open cables
PDF
Cloud Security - Security Aspects of Cloud Computing
PDF
Charte informatique
PPTX
palo-alto-networks-sase-overview-deck.pptx
PDF
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdf
PDF
Brkarc 3454 - in-depth and personal with the cisco nexus 2000 fabric extender...
PDF
클라우드 보안 이슈 및 원격 관제 기반 대응 방안 - AWS Summit Seoul 2017
DOCX
Rapport mise en place d'un sevrer VPN .
PPTX
Why Zero Trust Architecture Will Become the New Normal in 2021
PDF
Soc Compliance Overview
PDF
The business case for SD WAN in the enterprise
PPTX
SASE Future Proof sdwan 20 Sep2020 v2.1 BA
PPTX
SD-WAN plus cloud security
ODP
05 01 open-vpn
DOCX
VPN WINDOWS LINUX OPENVPN
PDF
resume-theorique-m204-v1-0-62f6e87c9c457 (1).pdf
Etude et mise en place d’un VPN
Atrinet - Lifecycle Service Manager
Colt's evolution from MPLS to Cloud Networking
Soutenance de stage
Submarine line termination equipment (SLTE) for open cables
Cloud Security - Security Aspects of Cloud Computing
Charte informatique
palo-alto-networks-sase-overview-deck.pptx
Aryaka Bringing SASE to Life with a Zero Trust WAN.pdf
Brkarc 3454 - in-depth and personal with the cisco nexus 2000 fabric extender...
클라우드 보안 이슈 및 원격 관제 기반 대응 방안 - AWS Summit Seoul 2017
Rapport mise en place d'un sevrer VPN .
Why Zero Trust Architecture Will Become the New Normal in 2021
Soc Compliance Overview
The business case for SD WAN in the enterprise
SASE Future Proof sdwan 20 Sep2020 v2.1 BA
SD-WAN plus cloud security
05 01 open-vpn
VPN WINDOWS LINUX OPENVPN
resume-theorique-m204-v1-0-62f6e87c9c457 (1).pdf
Ad

Similar to Applying the MITRE CREF.pptx (20)

PPTX
Accidental Resiliency - MITRE ResilienCyCon 2022-draft-PRE-MARKETING -grey.pptx
PDF
Vss Security And Compliance For The Cloud
PDF
Vmware Seminar Security & Compliance for the cloud with Trend Micro
PDF
Zimory White Paper: Security in the Cloud pt 2/2
PPTX
Cloud security From Infrastructure to People-ware
PDF
Information Security Risk Management
PDF
Securing your Cloud with Xen - SUSECon 2013
PDF
Alternatives for-securing-virtual-networks
PDF
Securing Your Cloud With the Xen Hypervisor by Russell Pavlicek
PDF
Build-a-Cloud Day - Securing Your Cloud with Xen
PPT
040711 webcast securing vmachine
PPTX
Dncybersecurity
PDF
Architecting cybersecurity to future proof smart cities against emerging cybe...
PDF
Defending Servers - Cyber security webinar part 3
PDF
Scale 12x Securing Your Cloud with The Xen Hypervisor
PDF
infraxstructure: Piotr Wojciechowski "Secure Data Center"
PPTX
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
PPTX
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
PPTX
Security Components Across OSI Layers (1-4).pptx
Accidental Resiliency - MITRE ResilienCyCon 2022-draft-PRE-MARKETING -grey.pptx
Vss Security And Compliance For The Cloud
Vmware Seminar Security & Compliance for the cloud with Trend Micro
Zimory White Paper: Security in the Cloud pt 2/2
Cloud security From Infrastructure to People-ware
Information Security Risk Management
Securing your Cloud with Xen - SUSECon 2013
Alternatives for-securing-virtual-networks
Securing Your Cloud With the Xen Hypervisor by Russell Pavlicek
Build-a-Cloud Day - Securing Your Cloud with Xen
040711 webcast securing vmachine
Dncybersecurity
Architecting cybersecurity to future proof smart cities against emerging cybe...
Defending Servers - Cyber security webinar part 3
Scale 12x Securing Your Cloud with The Xen Hypervisor
infraxstructure: Piotr Wojciechowski "Secure Data Center"
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
Security Components Across OSI Layers (1-4).pptx
Ad

More from Art Ocain (12)

PPTX
Accidental Resiliency - Global Resilience Federation (GRF) Business Resilienc...
PPTX
vCIO vCISO - Information Technology and Security Strategy.pptx
PPTX
Cybersecurity for Small Business - Incident Response.pptx
PPTX
MePush Leadership Fundamentals - Week 5
PPTX
MePush Leadership Fundamentals - Week 4
PPTX
MePush Leadership Fundamentals - Week 3
PPTX
MePush Leadership Fundamentals - Week 2
PPTX
Anatomy of a Ransomware Event
PPTX
MePush Leadership Fundamentals - Week 1
PPTX
Control Your Data: 3 Steps for Data Governance for Work from Home Staff
PPTX
Be More Secure than your Competition: MePush Cyber Security for Small Business
PPTX
Internet safety and you
Accidental Resiliency - Global Resilience Federation (GRF) Business Resilienc...
vCIO vCISO - Information Technology and Security Strategy.pptx
Cybersecurity for Small Business - Incident Response.pptx
MePush Leadership Fundamentals - Week 5
MePush Leadership Fundamentals - Week 4
MePush Leadership Fundamentals - Week 3
MePush Leadership Fundamentals - Week 2
Anatomy of a Ransomware Event
MePush Leadership Fundamentals - Week 1
Control Your Data: 3 Steps for Data Governance for Work from Home Staff
Be More Secure than your Competition: MePush Cyber Security for Small Business
Internet safety and you

Recently uploaded (20)

PDF
Unlock new opportunities with location data.pdf
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
CloudStack 4.21: First Look Webinar slides
PPT
What is a Computer? Input Devices /output devices
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Architecture types and enterprise applications.pdf
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPT
Geologic Time for studying geology for geologist
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
August Patch Tuesday
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPTX
The various Industrial Revolutions .pptx
Unlock new opportunities with location data.pdf
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Hindi spoken digit analysis for native and non-native speakers
CloudStack 4.21: First Look Webinar slides
What is a Computer? Input Devices /output devices
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
1 - Historical Antecedents, Social Consideration.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Architecture types and enterprise applications.pdf
Taming the Chaos: How to Turn Unstructured Data into Decisions
Geologic Time for studying geology for geologist
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
NewMind AI Weekly Chronicles – August ’25 Week III
August Patch Tuesday
Enhancing emotion recognition model for a student engagement use case through...
Web Crawler for Trend Tracking Gen Z Insights.pptx
O2C Customer Invoices to Receipt V15A.pptx
sustainability-14-14877-v2.pddhzftheheeeee
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
The various Industrial Revolutions .pptx

Applying the MITRE CREF.pptx

  • 1. “You cannot stop a determined threat actor from pwning you.” –quote by me, when telling IT/cybersecurity pros to take other steps to plan for the pain.
  • 3. ATT&CK® knowledgebase adversary tactics and techniques D3FEND™ knowledgebase of defensive countermeasures Engage™ framework for adversary engagement and deception CALDERA™ framework for automated adversary/red-team emulation Cyber Resiliency Engineering Framework (CREF) framework for cyber resilience design
  • 9. Bending, but not breaking. 1 Withstanding an attack or outage AND recovering quickly. 2 Bouncing back from an attack. 3
  • 14. Anticipate Withstand Recover Adapt IDENTIFY PROTECT DETECT RESPOND RECOVER MITRE CREF NIST CSF
  • 15. Anticipate Identify Protect Detect Respond Withstand Recover Adapt MITRE CREF & NIST CSF Together <3 CREF CREF CREF CREF CSF CSF CSF CSF
  • 17. Incident Response Managed IT Operations Managed Cybersecurity Insights The VEEAM Story and Threat Actors: • Run “kill scripts” on target hosts to disable VSS, delete VSS snapshots • Delete/encrypt backups • Steal credentials for SAN and delete SAN snapshots • Encrypt VMware ESXi hosts • Attack DR sites and cloud resources over VPN from production network
  • 18. VLAN 101 I’m simple, but flat and easy to attack.
  • 19. The VEEAM Story: Veeam (on-premises backup software and infrastructure) was being deleted or encrypted in ransomware attacks. • Outcome: All servers, backup infrastructure, and storage is accessible to attacker and encrypted/deleted in ransomware attack. VLAN 101 I’m simple, but flat and easy to attack.
  • 20. VLAN 101 VLAN 102 1 3 2 4 5 6 7 8 PWR FAN ALM STS HA TMP MGT CONSOLE USB 9 11 13 15 10 12 14 16 17 18 HA1 HA2 PA-3060 Firewall: Block inter-VLAN traffic for 101 and 102. Hole punched into VLAN for admin access. MITRE|CREF Navigator™ →Re-Architect →→Predefined Segmentation
  • 21. The VEEAM Story: • We disjoined Veeam Backup Server from domain (so attacker cannot access it by compromising Active Directory). • We segmented the network. • Outcome: Improved restorability, but administrative access to VLAN102 can still be compromised if attacker compromises admin PC. VLAN 101 VLAN 102 1 3 2 4 5 6 7 8 PWR FAN ALM STS HA TMP MGT CONSOLE USB 9 11 13 15 10 12 14 16 17 18 HA1 HA2 PA-3060 Firewall: Block inter-VLAN traffic for 101 and 102. Hole punched into VLAN for admin access. MITRE|CREF Navigator™ →Re-Architect →→Predefined Segmentation
  • 22. VLAN 101 VLAN 102 1 3 2 4 5 6 7 8 PWR FAN ALM STS HA TMP MGT CONSOLE USB 9 11 13 15 10 12 14 16 17 18 HA1 HA2 PA-3060 Firewall: Block inter-VLAN traffic for 101 and 102. AWS Azure MITRE|CREF Navigator™ →Reconstitute → Redundancy →→Protected Backup & Restore
  • 23. The VEEAM Story: • We added immutable cloud storage for Veeam scale sets. • Outcome: If on-premises infrastructure is completely compromised, we still have a recovery path. VLAN 101 VLAN 102 1 3 2 4 5 6 7 8 PWR FAN ALM STS HA TMP MGT CONSOLE USB 9 11 13 15 10 12 14 16 17 18 HA1 HA2 PA-3060 Firewall: Block inter-VLAN traffic for 101 and 102. AWS Azure MITRE|CREF Navigator™ →Reconstitute → Redundancy →→Protected Backup & Restore
  • 24. VLAN 101 VLAN 102 1 3 2 4 5 6 7 8 PWR FAN ALM STS HA TMP MGT CONSOLE USB 9 11 13 15 10 12 14 16 17 18 HA1 HA2 PA-3060 Firewall: Block inter-VLAN traffic for 101 and 102. AWS Azure DRaaS Cloud Credential & Key Vault MITRE|CREF Navigator™ →Reconstitute → Redundancy →→Protected Backup & Restore
  • 25. The VEEAM Story: • We used a key vault for AWS and Azure storage keys and associated creds to prevent credential theft. (Admins don’t keep the passwords/keys.) • We added alternate, slower immutable cloud backup of critical VMs as a failsafe. • Outcome: Protection of backup resources and recovery paths. VLAN 101 VLAN 102 1 3 2 4 5 6 7 8 PWR FAN ALM STS HA TMP MGT CONSOLE USB 9 11 13 15 10 12 14 16 17 18 HA1 HA2 PA-3060 Firewall: Block inter-VLAN traffic for 101 and 102. AWS Azure DRaaS Cloud Credential & Key Vault MITRE|CREF Navigator™ →Reconstitute → Redundancy →→Protected Backup & Restore
  • 26. Prevent or Avoid Prepare Continue Constrain Reconstitute Understand Transform Re-Architect
  • 31. Focus on common critical assets Focus Support agility and architect for adaptability Support Reduce attack surfaces Reduce Assume compromise Assume Expect adversaries to evolve Expect

Editor's Notes

  • #17: Most of all: Learn from Failure
  • #18: Automation: “Kill scripts” on hosts that delete volume shadow copies using vssadmin.exe Delete Shadows /All /Quiet and disable VSS. Manually (hands on keyboards): Attackers identify Veeam servers and Veeam backup repositories and delete/encrypt the backups (as well as other backup solutions). Manually (hands on keyboards): Attackers delete snapshots on storage arrays (have seen this on EMC and Pure Storage) and disable snapshotting and replication. Manually (hands on keyboards): Attackers identify, attack, and encrypt hot DR sites over live VPNs from the production site. We’re seeing this and learning to protect our backups.