SlideShare a Scribd company logo
2
Most read
EVALUATING AND ENHANCING SECURITY
MATURITY THROUGH MITRE ATT&CK
MAPPING
Pranusha Somareddy
• Over the last 7 years, actively worked on Penetration Testing,
Blue Teaming, Infrastructure and Product Security.
• Founding and Senior Security Engineer at Lark Health
Agenda
● Human error in security breaches
● Map MITRE ATT&CK Techniques to security controls
● Security Awareness is Security Maturity
● Evaluating security awareness
● Enhancing security awareness
Human Error in Security breaches
2017
Equifax announced a data
breach that exposed the
personal information of 147
million people.
2018
Panera Bread exposed
millions of customer
records because of a
misconfigured API that
allowed access to
sensitive information.
2019
Capital One data breach
exposed data of 100
million credit card
applicants
2020
The University of
California disclosed a
breach in which
unauthorized access
was gained to personal
and financial
information employees.
2021
Colonial Pipeline, a major fuel
pipeline operator in the
United States, fell victim to a
ransomware attack.
2022
Robinhood disclosed a data
breach that potentially
gave access user data.
Mapping
Security
Controls
Initial Access
• MFA Authentication
• SSO based logins
• Phishing awareness
training
• Continuous Patch
Management
Execution
&
Persistence
• Principle of Least
Privilege
• Quarterly access
auditing
• Role Based Access
Control
• Logging and
Monitoring
Exfiltration
• Strong Encryption
techniques
• Limited Access to
Data
• Policies and
procedures to report
data breaches
Initial Access
M1017 - User Training
M1032 - MFA
Authentication
M1027 - Password
Policies
TA0001 - Initial
Access
T1566 - Phishing
T1078 - Valid
Accounts
Execution & Persistence
M1026 - Privileged
Account Management
M1017 - User Training
M1026 - User Account
Management
M1032 - Multi-
factor Authentication
Execution and
Persistence
T1204 - User
Execution
T1651 - Cloud
Administration
Command
T1609 - Container
Administration
Command
T1098- Account
Manipulation
T1556 - Modify
Authentication Process
M1027 - Password
Policies
Data Collection
M1047 - Audit
M1041 - Encrypt
Sensitive Information
M1026 - User Account
Management
M1032 - Multi-
factor Authentication
Data Collection
T1213 - Data from
Information
Repositories
T1530 - Data from
Cloud Storage
T1005 - Data from
Local System
M1057 - Data Loss
Prevention
M1017 - User
Training
Evaluate Security Awareness
● Identify the Security Champions
● Phishing Email campaigns
● Simulation Red Team Activities
● Security Awareness questionnaires
● Code Review Analysis
● Security Feedback loop
Enhance Security Awareness
Customized Security Trainings
Instill Security Importance in Managers
Security Engineer Collaboration
Incident Response Tabletop Exercises
Educative Security Newsletters
Enhance Security Awareness to Enhance Security Maturity
Achieving security maturity is not a
one-time event but it is a continuous
journey

More Related Content

PDF
CISA usage of ATT&CK in Cybersecurity Advisories
PDF
Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...
PDF
Grow Up! Evaluating and Maturing Your SOC using MITRE ATT&CK
PDF
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
PDF
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
PDF
MITRE ATT&CK Updates: ICS
PDF
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
PDF
When Insiders ATT&CK!
CISA usage of ATT&CK in Cybersecurity Advisories
Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...
Grow Up! Evaluating and Maturing Your SOC using MITRE ATT&CK
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
MITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
When Insiders ATT&CK!

What's hot (20)

PDF
Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR Telemetry
PDF
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...
PDF
.LNK Tears of the Kingdom
PDF
One Leg to Stand on: Adventures in Adversary Tracking with ATT&CK
PDF
MITRE ATT&CK based Threat Analysis for Electronic Flight Bag
PDF
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
PDF
Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...
PDF
ATT&CKing the Red/Blue Divide
PDF
ATT&CK Metaverse - Exploring the Limitations of Applying ATT&CK
PDF
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
PDF
Knowledge for the masses: Storytelling with ATT&CK
PDF
ATT&CKING Containers in The Cloud
PDF
Introduction to red team operations
PDF
Updates from the Center for Threat-Informed Defense
PDF
Would you Rather Have Telemetry into 2 Attacks or 20? An Insight Into Highly ...
PPTX
Security Operation Center Fundamental
PDF
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
PDF
ATT&CKcon Intro
PDF
Mapping ATT&CK Techniques to ENGAGE Activities
PDF
Threat Modelling - It's not just for developers
Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR Telemetry
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...
.LNK Tears of the Kingdom
One Leg to Stand on: Adventures in Adversary Tracking with ATT&CK
MITRE ATT&CK based Threat Analysis for Electronic Flight Bag
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...
ATT&CKing the Red/Blue Divide
ATT&CK Metaverse - Exploring the Limitations of Applying ATT&CK
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Knowledge for the masses: Storytelling with ATT&CK
ATT&CKING Containers in The Cloud
Introduction to red team operations
Updates from the Center for Threat-Informed Defense
Would you Rather Have Telemetry into 2 Attacks or 20? An Insight Into Highly ...
Security Operation Center Fundamental
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
ATT&CKcon Intro
Mapping ATT&CK Techniques to ENGAGE Activities
Threat Modelling - It's not just for developers
Ad

Similar to Evaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping (20)

PPTX
Sw keynote
PPTX
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
PPT
George Gavras 2010 Fowler Seminar
PPTX
How Data Security Impacts The Tech Industry.pptx
PDF
How Data Security Impacts The Tech Industry
PDF
Enterprise Information Systems Security: A Case Study in the Banking Sector
PDF
ISACA Los Angeles 2010 Compliance - Ulf Mattsson
PDF
How to Secure Your Files with DLP and FAM
PDF
Keynote oracle entitlement-driven idm
PDF
The Most Common Failure With Today's Defences
PDF
Data breaches at home and abroad
PPSX
November 2017: Part 6
PDF
Annual OktCyberfest 2019
PDF
2015-06-16 IT Security - What You Need to Know
PDF
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
PDF
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
PPTX
How to Audit Your Incident Response Plan
PPTX
ch07-Security.pptx
PPTX
Securing the Skies: Navigating Cloud Security Challenges and Beyond
PPTX
Don't Get Stung - Student Data Security
Sw keynote
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
George Gavras 2010 Fowler Seminar
How Data Security Impacts The Tech Industry.pptx
How Data Security Impacts The Tech Industry
Enterprise Information Systems Security: A Case Study in the Banking Sector
ISACA Los Angeles 2010 Compliance - Ulf Mattsson
How to Secure Your Files with DLP and FAM
Keynote oracle entitlement-driven idm
The Most Common Failure With Today's Defences
Data breaches at home and abroad
November 2017: Part 6
Annual OktCyberfest 2019
2015-06-16 IT Security - What You Need to Know
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
How to Audit Your Incident Response Plan
ch07-Security.pptx
Securing the Skies: Navigating Cloud Security Challenges and Beyond
Don't Get Stung - Student Data Security
Ad

More from MITRE ATT&CK (20)

PDF
Next-Gen Threat-Informed Defense: Human-Assisted Intelligent Agents - Rajesh ...
PDF
Birds of a Feather: The Evolution of Threat Actor Prioritization, Gap Analysi...
PDF
Using ATT&CK and MITRE CTID’s StP Frameworks to Assess Threat Detection Resil...
PDF
Bridging the Gap: Enhancing Detection Coverage with Atomic Red Team, Sigma, a...
PDF
SaaSy ATT&CK – Practical ATT&CK usage for SaaS-based Telemetry - Aaron Shelmire
PDF
I'll take ATT&CK techniques that can be done for $1000, Alex. - Ben Langrill
PDF
Practical Application of MITRE ATT&CK: Real World Usage in a Corporate Enviro...
PDF
This is why we don’t shout “Bingo”: Analyzing ATT&CK Integration in Endpoint ...
PDF
Every Cloud Has a Purple Lining - Arun Seelagan
PDF
Confession: 3 Things I Wish I Knew About MITRE ATT&CK When I Was an FBI Profi...
PDF
ATT&CKcon 5.0 Keynote - From Ticket Closers to Practitioners- How Great Secu...
PDF
ATT&CKcon 5.0 Lightning Talks - Various Speakers
PDF
MITRE ATT&CK Updates: Defensive ATT&CK - Lex Crumpton
PDF
MITRE ATT&CK Updates: Enterprise - Casey Knerr
PDF
MITRE ATT&CK Updates: CTI - Path Forward - Joe Slowik
PDF
MITRE ATT&CK Updates: Software - Jared Ondricek
PDF
State of the ATT&CK 2024 - Adam Pennington
PDF
Sources of ATT&CK: A Bibliographic Journey through Enterprise ATT&CK - Robert...
PDF
Updates from The Center for Threat Informed Defense - Jon Baker
PDF
Go Go Ransom Rangers: Diving into Akira’s Linux Variant with ATT&CK - Nicole ...
Next-Gen Threat-Informed Defense: Human-Assisted Intelligent Agents - Rajesh ...
Birds of a Feather: The Evolution of Threat Actor Prioritization, Gap Analysi...
Using ATT&CK and MITRE CTID’s StP Frameworks to Assess Threat Detection Resil...
Bridging the Gap: Enhancing Detection Coverage with Atomic Red Team, Sigma, a...
SaaSy ATT&CK – Practical ATT&CK usage for SaaS-based Telemetry - Aaron Shelmire
I'll take ATT&CK techniques that can be done for $1000, Alex. - Ben Langrill
Practical Application of MITRE ATT&CK: Real World Usage in a Corporate Enviro...
This is why we don’t shout “Bingo”: Analyzing ATT&CK Integration in Endpoint ...
Every Cloud Has a Purple Lining - Arun Seelagan
Confession: 3 Things I Wish I Knew About MITRE ATT&CK When I Was an FBI Profi...
ATT&CKcon 5.0 Keynote - From Ticket Closers to Practitioners- How Great Secu...
ATT&CKcon 5.0 Lightning Talks - Various Speakers
MITRE ATT&CK Updates: Defensive ATT&CK - Lex Crumpton
MITRE ATT&CK Updates: Enterprise - Casey Knerr
MITRE ATT&CK Updates: CTI - Path Forward - Joe Slowik
MITRE ATT&CK Updates: Software - Jared Ondricek
State of the ATT&CK 2024 - Adam Pennington
Sources of ATT&CK: A Bibliographic Journey through Enterprise ATT&CK - Robert...
Updates from The Center for Threat Informed Defense - Jon Baker
Go Go Ransom Rangers: Diving into Akira’s Linux Variant with ATT&CK - Nicole ...

Recently uploaded (20)

PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Cloud computing and distributed systems.
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
Spectroscopy.pptx food analysis technology
PDF
Encapsulation theory and applications.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPT
Teaching material agriculture food technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Programs and apps: productivity, graphics, security and other tools
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Cloud computing and distributed systems.
20250228 LYD VKU AI Blended-Learning.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Empathic Computing: Creating Shared Understanding
Digital-Transformation-Roadmap-for-Companies.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Approach and Philosophy of On baking technology
Spectroscopy.pptx food analysis technology
Encapsulation theory and applications.pdf
Review of recent advances in non-invasive hemoglobin estimation
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Teaching material agriculture food technology
Advanced methodologies resolving dimensionality complications for autism neur...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
sap open course for s4hana steps from ECC to s4
Reach Out and Touch Someone: Haptics and Empathic Computing
MIND Revenue Release Quarter 2 2025 Press Release
Programs and apps: productivity, graphics, security and other tools

Evaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping

  • 1. EVALUATING AND ENHANCING SECURITY MATURITY THROUGH MITRE ATT&CK MAPPING
  • 2. Pranusha Somareddy • Over the last 7 years, actively worked on Penetration Testing, Blue Teaming, Infrastructure and Product Security. • Founding and Senior Security Engineer at Lark Health
  • 3. Agenda ● Human error in security breaches ● Map MITRE ATT&CK Techniques to security controls ● Security Awareness is Security Maturity ● Evaluating security awareness ● Enhancing security awareness
  • 4. Human Error in Security breaches 2017 Equifax announced a data breach that exposed the personal information of 147 million people. 2018 Panera Bread exposed millions of customer records because of a misconfigured API that allowed access to sensitive information. 2019 Capital One data breach exposed data of 100 million credit card applicants 2020 The University of California disclosed a breach in which unauthorized access was gained to personal and financial information employees. 2021 Colonial Pipeline, a major fuel pipeline operator in the United States, fell victim to a ransomware attack. 2022 Robinhood disclosed a data breach that potentially gave access user data.
  • 5. Mapping Security Controls Initial Access • MFA Authentication • SSO based logins • Phishing awareness training • Continuous Patch Management Execution & Persistence • Principle of Least Privilege • Quarterly access auditing • Role Based Access Control • Logging and Monitoring Exfiltration • Strong Encryption techniques • Limited Access to Data • Policies and procedures to report data breaches
  • 6. Initial Access M1017 - User Training M1032 - MFA Authentication M1027 - Password Policies TA0001 - Initial Access T1566 - Phishing T1078 - Valid Accounts
  • 7. Execution & Persistence M1026 - Privileged Account Management M1017 - User Training M1026 - User Account Management M1032 - Multi- factor Authentication Execution and Persistence T1204 - User Execution T1651 - Cloud Administration Command T1609 - Container Administration Command T1098- Account Manipulation T1556 - Modify Authentication Process M1027 - Password Policies
  • 8. Data Collection M1047 - Audit M1041 - Encrypt Sensitive Information M1026 - User Account Management M1032 - Multi- factor Authentication Data Collection T1213 - Data from Information Repositories T1530 - Data from Cloud Storage T1005 - Data from Local System M1057 - Data Loss Prevention M1017 - User Training
  • 9. Evaluate Security Awareness ● Identify the Security Champions ● Phishing Email campaigns ● Simulation Red Team Activities ● Security Awareness questionnaires ● Code Review Analysis ● Security Feedback loop
  • 10. Enhance Security Awareness Customized Security Trainings Instill Security Importance in Managers Security Engineer Collaboration Incident Response Tabletop Exercises Educative Security Newsletters Enhance Security Awareness to Enhance Security Maturity
  • 11. Achieving security maturity is not a one-time event but it is a continuous journey