SlideShare a Scribd company logo
3. Persistence
7. Discovery
9. Collection
Mitre ATT&CK Stage Tactic GRU
1. Initial Access
6. Credential Access
5. Defense Evasion
4. Privilege Escalation
!
2. Execution
8. Lateral Movement
10. Exfiltration
11. Command & Control
Spearphishing
attachment
Application
whitelisting
Drive-by
Compromise
Spearphishing
link
Exploit
Public-Facing
Application
User
Execution
Valid Accounts
Exploitation
for Client
Execution
Trusted
Relationship
Spearphishing
via Service
Bootkit
Valid Accounts
Login Item
Launch Agent
Application
Shimming
Modify
Existing
Service
Web Shell
Obfuscated
Files or
Information
Clear
Command
History
Masquerading
Exploitation
for Defense
Evasion
Input Capture
Exploitation
for Credential
Access
Remote
Services
Credentials in
Files
Network
Service
Scanning
Private Keys
Remote
System
Discovery
Hooking
Windows
Admin Shares
Data from Local
System / Network
Shared Drive
Data Staged
Input Capture
Email
Collection
Screen
Capture
Data
Encrypted
Data
Compressed
Automated Col-
lection
Custom
Cryptographic
Protocol
Commonly
Used Port
Data Encoding
Custom
Command and
Control Protocol
Remote File
Copy
Multi-hop
Proxy
ASD Essential 8 and Mitre ATT&CK
Exploitation
for Privilege
Escalation
Data from
Information Re-
positories
FIN7 FSB
Hidden
COBRA ASD Essential 8 Digital Shadows Advice
Patch applications,
Patch operating
systems
Multi-factor
authentication
Restrict
administrative priv-
ileges
Patch applications
User application
hardening, Configure
Microsoft Office
macro settings
Restrict
administrative
privileges, Patch
Operating Systems
Restrict
administrative
privileges
Patch Operating
Systems
Multi-factor
authentication
Patch Operating
Systems
Patch User
Applications
Patch User
Applications
Application
Whitelisting
Application
Whitelisting
Multi-factor
authentication
Restrict
administrative
privileges
Restrict
administrative
privileges
Restrict
administrative
privileges
Monitoring for the creation of phishing
domains
Monitoring for persistence mechanisms via
KnockKnock or for launch file creation via
other file monitoring solutions such as EDR
Example: Monitoring for PowerShell scripts
via the Anti Malware Script Interface (AMSI) in
Windows 10 reveals the deobfuscated
commands
Monitoring for user authentications, via SSH
for example, which do not correspond to
changes in a user’s command history may
indicate attempts to evade detection
EDR systems may be able to detect
attempts to install hook procedures
Procedural controls such as training,
awareness and regular reviews can be used
to educate users to the dangers of leaving
valid credentials in files
EDR and/or SIEM solutions can detect port
scanning activities
EDR and/or SIEM solutions can detect
remote system discovery activities
Malicious behavior can be cross-correlated
with the accessing of remote services to
track an adversary through an environment
EDR and/or SIEM solutions can be used to
detect data being gather from local and
remote systems
EDR and/or SIEM solutions can be used to
detect data being automatically collected
especially when scripts or command line
tools are used
User Behavior Analytics (UBA) may detect
anomalous collection patterns. Logs of
activity for information repository access
should be kept
EDR and/or SIEM solutions can be used to
detect email being collected especially when
scripts or command line tools are
used against APIs
EDR and/or SIEM solutions can be used to
detect data being staged especially when
scripts or command line tools are used
Network monitoring can be used to detect
the usage of protocols typically not present
in an environment, such as FTP, as well as
anomalous file transfers via other mediums
Network monitoring can detect the usage
of, for example, base64 encoding in network
traffic
Network monitoring for encrypted
communications which do not follow
standards such as TLS/SSL may detect the
usage of custom cryptographic protocols
Network logs can be used to detect anom-
alous network traffic using protocols such
as DNS in previously unseen ways
Network logs can be used to detect anom-
alous network traffic, e.g., from previously
unseen applications
Monitoring for the creation of phishing
domains
Monitoring for the creation of phishing
domains

More Related Content

PDF
Fungsi muskuloskeletal dan pergerakan manusia
PPTX
Kuasa dalam Sains Sukan: Definisi & Latihan
PPTX
International Humanitarian Law Lecture 19 - 70 Years of Geneva Conventions
PPT
(3) res gestae
PPT
Law of Prescription
PDF
Bab 2 koordinasi badan... sains tingkatan4
PPT
Sains Sukan Tingkatan 5 Bab 3
PPT
(2) hearsay evidence
Fungsi muskuloskeletal dan pergerakan manusia
Kuasa dalam Sains Sukan: Definisi & Latihan
International Humanitarian Law Lecture 19 - 70 Years of Geneva Conventions
(3) res gestae
Law of Prescription
Bab 2 koordinasi badan... sains tingkatan4
Sains Sukan Tingkatan 5 Bab 3
(2) hearsay evidence

What's hot (13)

PPTX
3.3 sukan dan pelancongan
DOCX
Kebaikan Memanaskan Badan dan Menyejukkan Badan
PPT
Kecederaan Otot
PPTX
Murder ACCORDING TO JURISTS VIEWS
PPT
Kemahiran sukan tingkatan 2(bola baling)
DOCX
Tutorial lubang butang bersirat
PPTX
Historical overview of crimnallaw in india
PPT
Crime and criminal law
PDF
4 mengukur tekanan darah
PPTX
Bantu mula
DOCX
Alatan jahitan latihan liveworksheet
PPTX
LAND LAW 1 Land Ownership in Islam -Revised Sem 2 2014
3.3 sukan dan pelancongan
Kebaikan Memanaskan Badan dan Menyejukkan Badan
Kecederaan Otot
Murder ACCORDING TO JURISTS VIEWS
Kemahiran sukan tingkatan 2(bola baling)
Tutorial lubang butang bersirat
Historical overview of crimnallaw in india
Crime and criminal law
4 mengukur tekanan darah
Bantu mula
Alatan jahitan latihan liveworksheet
LAND LAW 1 Land Ownership in Islam -Revised Sem 2 2014
Ad

Similar to Mapping the ASD Essential 8 to the Mitre ATTACK™ framework (20)

PPTX
Hunting for Cyber Threats Using Threat Modeling & Frameworks
PPTX
Defend Your Data Now with the MITRE ATT&CK Framework
PDF
Mobile Application Pentest [Fast-Track]
PPTX
Cyber_Threat_Intelligent_Cyber_Operation_Contest
PPTX
Infrastructure security & Incident Management
PPTX
Seucrity in a nutshell
PDF
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
PDF
Top 50 Cybersecurity Interview Questions-2.pdf
PDF
Which Came First: The Phish or the Opportunity to Defend Against It
PPTX
Scan Website Vulnerability - Project Presentation
PPTX
Understanding Network Security and Vulnerability Assessment
PPTX
Security and-visibility
DOCX
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
PPS
Cs Wif I System Overview 2009
PDF
OWASP Top 10 Mobile Risks
PDF
Update from the MITRE ATT&CK Team
PPTX
Secure Android Development
PPT
Computer Systems Security
PPT
Computersystemssecurity 090529105555-phpapp01
PPTX
Ethical Hacking - sniffing
Hunting for Cyber Threats Using Threat Modeling & Frameworks
Defend Your Data Now with the MITRE ATT&CK Framework
Mobile Application Pentest [Fast-Track]
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Infrastructure security & Incident Management
Seucrity in a nutshell
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
Top 50 Cybersecurity Interview Questions-2.pdf
Which Came First: The Phish or the Opportunity to Defend Against It
Scan Website Vulnerability - Project Presentation
Understanding Network Security and Vulnerability Assessment
Security and-visibility
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
Cs Wif I System Overview 2009
OWASP Top 10 Mobile Risks
Update from the MITRE ATT&CK Team
Secure Android Development
Computer Systems Security
Computersystemssecurity 090529105555-phpapp01
Ethical Hacking - sniffing
Ad

More from Digital Shadows (20)

PDF
Threat model of a remote worker | Infographic
PDF
Inadvertant Data Breaches
PDF
Digital Shadows and the NIST Cyber Security Framework
PPTX
WTF is Digital Risk Protection
PDF
Digital Shadows SearchLight™ Overview
PDF
Data Loss Detection
PDF
Detecting Spoof Domains
PDF
Digital Shadows Shadow Search
PDF
Mitre ATT&CK and the Mueller GRU Indictment: Lessons for Organizations
PDF
MITRE ATT&CK and 2017 FSB Indictment
PDF
Mitre ATTACK and the North Korean Regime-Backed Programmer
PDF
Digital Shadows and Demisto Enterprise Integration Datasheet
PDF
Digital Shadows and Palo Alto Networks Integration Datasheet
PDF
Data Sources - Digital Shadows
PDF
Energy and Utilities Firm Increases Productivity by Reducing False Positives
PDF
Digital Shadows Client Feedback
PDF
Managed Takedown Service - Digital Shadows
PDF
Source Code and Admin Password Shared on Public Site by Developer
PDF
Phishing Site Detected and Taken Down
PDF
Mobile Application Detected Impersonating Company Brand
Threat model of a remote worker | Infographic
Inadvertant Data Breaches
Digital Shadows and the NIST Cyber Security Framework
WTF is Digital Risk Protection
Digital Shadows SearchLight™ Overview
Data Loss Detection
Detecting Spoof Domains
Digital Shadows Shadow Search
Mitre ATT&CK and the Mueller GRU Indictment: Lessons for Organizations
MITRE ATT&CK and 2017 FSB Indictment
Mitre ATTACK and the North Korean Regime-Backed Programmer
Digital Shadows and Demisto Enterprise Integration Datasheet
Digital Shadows and Palo Alto Networks Integration Datasheet
Data Sources - Digital Shadows
Energy and Utilities Firm Increases Productivity by Reducing False Positives
Digital Shadows Client Feedback
Managed Takedown Service - Digital Shadows
Source Code and Admin Password Shared on Public Site by Developer
Phishing Site Detected and Taken Down
Mobile Application Detected Impersonating Company Brand

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
1. Introduction to Computer Programming.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Empathic Computing: Creating Shared Understanding
Dropbox Q2 2025 Financial Results & Investor Presentation
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
A comparative analysis of optical character recognition models for extracting...
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Building Integrated photovoltaic BIPV_UPV.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Spectral efficient network and resource selection model in 5G networks
SOPHOS-XG Firewall Administrator PPT.pptx
A Presentation on Artificial Intelligence
Mobile App Security Testing_ A Comprehensive Guide.pdf
Encapsulation_ Review paper, used for researhc scholars
Assigned Numbers - 2025 - Bluetooth® Document
1. Introduction to Computer Programming.pptx
Unlocking AI with Model Context Protocol (MCP)
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Profit Center Accounting in SAP S/4HANA, S4F28 Col11

Mapping the ASD Essential 8 to the Mitre ATTACK™ framework

  • 1. 3. Persistence 7. Discovery 9. Collection Mitre ATT&CK Stage Tactic GRU 1. Initial Access 6. Credential Access 5. Defense Evasion 4. Privilege Escalation ! 2. Execution 8. Lateral Movement 10. Exfiltration 11. Command & Control Spearphishing attachment Application whitelisting Drive-by Compromise Spearphishing link Exploit Public-Facing Application User Execution Valid Accounts Exploitation for Client Execution Trusted Relationship Spearphishing via Service Bootkit Valid Accounts Login Item Launch Agent Application Shimming Modify Existing Service Web Shell Obfuscated Files or Information Clear Command History Masquerading Exploitation for Defense Evasion Input Capture Exploitation for Credential Access Remote Services Credentials in Files Network Service Scanning Private Keys Remote System Discovery Hooking Windows Admin Shares Data from Local System / Network Shared Drive Data Staged Input Capture Email Collection Screen Capture Data Encrypted Data Compressed Automated Col- lection Custom Cryptographic Protocol Commonly Used Port Data Encoding Custom Command and Control Protocol Remote File Copy Multi-hop Proxy ASD Essential 8 and Mitre ATT&CK Exploitation for Privilege Escalation Data from Information Re- positories FIN7 FSB Hidden COBRA ASD Essential 8 Digital Shadows Advice Patch applications, Patch operating systems Multi-factor authentication Restrict administrative priv- ileges Patch applications User application hardening, Configure Microsoft Office macro settings Restrict administrative privileges, Patch Operating Systems Restrict administrative privileges Patch Operating Systems Multi-factor authentication Patch Operating Systems Patch User Applications Patch User Applications Application Whitelisting Application Whitelisting Multi-factor authentication Restrict administrative privileges Restrict administrative privileges Restrict administrative privileges Monitoring for the creation of phishing domains Monitoring for persistence mechanisms via KnockKnock or for launch file creation via other file monitoring solutions such as EDR Example: Monitoring for PowerShell scripts via the Anti Malware Script Interface (AMSI) in Windows 10 reveals the deobfuscated commands Monitoring for user authentications, via SSH for example, which do not correspond to changes in a user’s command history may indicate attempts to evade detection EDR systems may be able to detect attempts to install hook procedures Procedural controls such as training, awareness and regular reviews can be used to educate users to the dangers of leaving valid credentials in files EDR and/or SIEM solutions can detect port scanning activities EDR and/or SIEM solutions can detect remote system discovery activities Malicious behavior can be cross-correlated with the accessing of remote services to track an adversary through an environment EDR and/or SIEM solutions can be used to detect data being gather from local and remote systems EDR and/or SIEM solutions can be used to detect data being automatically collected especially when scripts or command line tools are used User Behavior Analytics (UBA) may detect anomalous collection patterns. Logs of activity for information repository access should be kept EDR and/or SIEM solutions can be used to detect email being collected especially when scripts or command line tools are used against APIs EDR and/or SIEM solutions can be used to detect data being staged especially when scripts or command line tools are used Network monitoring can be used to detect the usage of protocols typically not present in an environment, such as FTP, as well as anomalous file transfers via other mediums Network monitoring can detect the usage of, for example, base64 encoding in network traffic Network monitoring for encrypted communications which do not follow standards such as TLS/SSL may detect the usage of custom cryptographic protocols Network logs can be used to detect anom- alous network traffic using protocols such as DNS in previously unseen ways Network logs can be used to detect anom- alous network traffic, e.g., from previously unseen applications Monitoring for the creation of phishing domains Monitoring for the creation of phishing domains