SlideShare a Scribd company logo
8
Most read
12
Most read
13
Most read
MITRE ATT&CK® Updates: ICS
Jake Steele: ICS ATT&CK Lead, MITRE
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
Who am I?
Part of ATT&CK for ICS’s original creation
§ Co-author to the ATT&CK for ICS philosophy
https://my.aacsb.edu/Portals/0/assets/images/contact/George-Mason-University.png
and have too many hobbies..
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
Why do we need an ATT&CK for ICS?
Enterprise
ATT&CK
ICS
ATT&CK
Process
Basic Control
Area Control
Operations Management
Supervisory Control
Enterprise Systems Level 5
Level 4
Level 3
Level 2
Level 1
Level 0
IT
OT
Source: Purdue Model, http://www.pera.net/Pera/PurdueReferenceModel/ReferenceModel.pdf
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
What's different about ATT&CK for ICS?
§ Adversary motivations are different
§ Objective depends on target
§ Interaction with physical world
§ Technologies are different
§ Protocols vary by sector
§ Different ways of defending them
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
Assets
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
Why do we need Assets in ICS?
§ Lots of industries
§ Assets and their functional roles
§ Process context & physics
§ Different dependencies, concerns,
names, and definitions
https://advantidge.com/wp-content/uploads/2022/02/critical-infrastructure-security.png
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
How we went about it
1. Identify based on CTI
§ Survey, much like mapping
for techniques
2. Research and refine based on
Industry standard definitions and
names
§ NIST 800-82
§ ISA 62443
§ Device vendor documentation
https://www.wired.com/images_blogs/threatlevel/2010/11/w32_stuxnet_dossier.pdf https://www.dragos.com/wp-content/uploads/TRISIS-01.pdf
https://www.boozallen.com/content/dam/boozallen/documents/2016/09/ukraine-report-when-the-lights-went-out.pdf https://web-assets.esetstatic.com/wls/2017/06/Win32_Industroyer.pdf
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
How we went about it
3. Perform analysis based on device features to associate with ATT&CK Techniques
§ Device Hardware
§ Wireless, USB, Modules, etc.
§ Software
§ Operating system(s), security features,
§ Architecture features
§ Network connectivity
§ Network Services
§ Intended Functional Role
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
What it looks like
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
What it looks like
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
What it looks like
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
How you can use this
§ Similar use cases to the rest of ATT&CK, we just removed some manual steps
§ Adversary emulation
§ Defense gap analysis
§ Cyber Threat Intelligence enrichment*
§ Failure scenario development
§ Educational resource
§ Augment your threat modeling efforts with an Asset-based focus
§ Utilize as a common lexicon for talking across industrial sectors or to describe risk to leadership
§ Underrepresented and unreported sectors
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
What's Next
§ Include additional data related to Asset and Technique relationships
§ Engage with the community
§ Direct feedback about the current baseline
§ Interest in engaging with underrepresented sectors
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
Applying Industry Standards to
ATT&CK Techniques
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
Original Understanding Based on Threat Reporting
§ Based on public reporting for ICS incidents this was the initial view:
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
Applying PLC Standards to Improve Understanding
§ IEC 61131: Programmable controllers – Part 3: Programming languages
§ Defines the program languages used within PLC
§ Underlying structures that should built into the controllers
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
Applying Standards to Mitigations
Communicate defenses leveraging
standards that the ICS community is
already using
§ IEC 62443 3-3, 4-2
§ NIST 800-53
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
The Future
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
What’s next?
§ Improving cross-domain capability within ATT&CK
§ Continued campaign adoption
§ Triton next on the list
§ Expanding coverage of Asset sectors
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
https://attack.mitre.org
attack@mitre.org
@mitreattack
Jake Steele

More Related Content

PDF
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
PDF
Grow Up! Evaluating and Maturing Your SOC using MITRE ATT&CK
PDF
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
PDF
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
PDF
Evaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
PDF
PDF
CISA usage of ATT&CK in Cybersecurity Advisories
PDF
MITRE ATT&CK Framework
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
Grow Up! Evaluating and Maturing Your SOC using MITRE ATT&CK
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
Evaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
CISA usage of ATT&CK in Cybersecurity Advisories
MITRE ATT&CK Framework

What's hot (20)

PDF
ATT&CK Updates- Defensive ATT&CK
PDF
Updates from the Center for Threat-Informed Defense
PDF
Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...
PDF
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
PDF
Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...
PDF
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
PDF
MITRE ATT&CK based Threat Analysis for Electronic Flight Bag
PDF
ATT&CKcon Intro
PDF
Threat Modelling - It's not just for developers
PDF
ATT&CKing the Red/Blue Divide
PDF
Exploring how Students Map Social Engineering Techniques to the ATT&CK Framew...
PDF
Mapping ATT&CK Techniques to ENGAGE Activities
PDF
Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR Telemetry
PPTX
ATT&CKing with Threat Intelligence
PPTX
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
PDF
Automating the mundanity of technique IDs with ATT&CK Detections Collector
PDF
One Leg to Stand on: Adventures in Adversary Tracking with ATT&CK
PDF
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
PDF
Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...
PDF
ATT&CKING Containers in The Cloud
ATT&CK Updates- Defensive ATT&CK
Updates from the Center for Threat-Informed Defense
Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
MITRE ATT&CK based Threat Analysis for Electronic Flight Bag
ATT&CKcon Intro
Threat Modelling - It's not just for developers
ATT&CKing the Red/Blue Divide
Exploring how Students Map Social Engineering Techniques to the ATT&CK Framew...
Mapping ATT&CK Techniques to ENGAGE Activities
Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR Telemetry
ATT&CKing with Threat Intelligence
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
Automating the mundanity of technique IDs with ATT&CK Detections Collector
One Leg to Stand on: Adventures in Adversary Tracking with ATT&CK
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...
ATT&CKING Containers in The Cloud
Ad

Similar to MITRE ATT&CK Updates: ICS (20)

PDF
State of the ATT&CK May 2023
PDF
MITRE ATT&CK Updates: State of the Cloud
PDF
A Diet of Poisoned Fruit: Designing Implants & OT Payloads for ICS Embedded D...
PPTX
Introduction to ThousandEyes
PDF
Challenges and Best Practices for Securing Modern Operational Technology Netw...
PDF
Prisma Cloud - CyberTech ID Forum 24.pdf
PPTX
Introduction to ThousandEyes
PDF
philip_industry zero trust presentation ppt
PPTX
Cisco Identity Services Engine (ISE) Zero Trust Workplace BDM.PPTX
PPTX
Cisco Identity Services Engine (ISE) Zero Trust Workplace BDM.PPTX
PPTX
Introduction to ThousandEyes
PDF
Cybridge Secure Content Filter for SCADA Networks
PDF
CABA Whitepaper - Cybersecurity in Smart Buildings
PDF
MITRE ATT&CK Updates: Software
PDF
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
PPTX
Cisco ucs overview ibm team 2014 v.2 - handout
PDF
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
PPTX
emea_cisco_live_webinar_150623.pptx
PDF
Reimagining the multi-tenant network - presented by Marvell.pdf
PDF
Booz Allen Industrial Cybersecurity Threat Briefing
State of the ATT&CK May 2023
MITRE ATT&CK Updates: State of the Cloud
A Diet of Poisoned Fruit: Designing Implants & OT Payloads for ICS Embedded D...
Introduction to ThousandEyes
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Prisma Cloud - CyberTech ID Forum 24.pdf
Introduction to ThousandEyes
philip_industry zero trust presentation ppt
Cisco Identity Services Engine (ISE) Zero Trust Workplace BDM.PPTX
Cisco Identity Services Engine (ISE) Zero Trust Workplace BDM.PPTX
Introduction to ThousandEyes
Cybridge Secure Content Filter for SCADA Networks
CABA Whitepaper - Cybersecurity in Smart Buildings
MITRE ATT&CK Updates: Software
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
Cisco ucs overview ibm team 2014 v.2 - handout
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
emea_cisco_live_webinar_150623.pptx
Reimagining the multi-tenant network - presented by Marvell.pdf
Booz Allen Industrial Cybersecurity Threat Briefing
Ad

More from MITRE ATT&CK (20)

PDF
Next-Gen Threat-Informed Defense: Human-Assisted Intelligent Agents - Rajesh ...
PDF
Birds of a Feather: The Evolution of Threat Actor Prioritization, Gap Analysi...
PDF
Using ATT&CK and MITRE CTID’s StP Frameworks to Assess Threat Detection Resil...
PDF
Bridging the Gap: Enhancing Detection Coverage with Atomic Red Team, Sigma, a...
PDF
SaaSy ATT&CK – Practical ATT&CK usage for SaaS-based Telemetry - Aaron Shelmire
PDF
I'll take ATT&CK techniques that can be done for $1000, Alex. - Ben Langrill
PDF
Practical Application of MITRE ATT&CK: Real World Usage in a Corporate Enviro...
PDF
This is why we don’t shout “Bingo”: Analyzing ATT&CK Integration in Endpoint ...
PDF
Every Cloud Has a Purple Lining - Arun Seelagan
PDF
Confession: 3 Things I Wish I Knew About MITRE ATT&CK When I Was an FBI Profi...
PDF
ATT&CKcon 5.0 Keynote - From Ticket Closers to Practitioners- How Great Secu...
PDF
ATT&CKcon 5.0 Lightning Talks - Various Speakers
PDF
MITRE ATT&CK Updates: Defensive ATT&CK - Lex Crumpton
PDF
MITRE ATT&CK Updates: Enterprise - Casey Knerr
PDF
MITRE ATT&CK Updates: CTI - Path Forward - Joe Slowik
PDF
MITRE ATT&CK Updates: Software - Jared Ondricek
PDF
State of the ATT&CK 2024 - Adam Pennington
PDF
Sources of ATT&CK: A Bibliographic Journey through Enterprise ATT&CK - Robert...
PDF
Updates from The Center for Threat Informed Defense - Jon Baker
PDF
Go Go Ransom Rangers: Diving into Akira’s Linux Variant with ATT&CK - Nicole ...
Next-Gen Threat-Informed Defense: Human-Assisted Intelligent Agents - Rajesh ...
Birds of a Feather: The Evolution of Threat Actor Prioritization, Gap Analysi...
Using ATT&CK and MITRE CTID’s StP Frameworks to Assess Threat Detection Resil...
Bridging the Gap: Enhancing Detection Coverage with Atomic Red Team, Sigma, a...
SaaSy ATT&CK – Practical ATT&CK usage for SaaS-based Telemetry - Aaron Shelmire
I'll take ATT&CK techniques that can be done for $1000, Alex. - Ben Langrill
Practical Application of MITRE ATT&CK: Real World Usage in a Corporate Enviro...
This is why we don’t shout “Bingo”: Analyzing ATT&CK Integration in Endpoint ...
Every Cloud Has a Purple Lining - Arun Seelagan
Confession: 3 Things I Wish I Knew About MITRE ATT&CK When I Was an FBI Profi...
ATT&CKcon 5.0 Keynote - From Ticket Closers to Practitioners- How Great Secu...
ATT&CKcon 5.0 Lightning Talks - Various Speakers
MITRE ATT&CK Updates: Defensive ATT&CK - Lex Crumpton
MITRE ATT&CK Updates: Enterprise - Casey Knerr
MITRE ATT&CK Updates: CTI - Path Forward - Joe Slowik
MITRE ATT&CK Updates: Software - Jared Ondricek
State of the ATT&CK 2024 - Adam Pennington
Sources of ATT&CK: A Bibliographic Journey through Enterprise ATT&CK - Robert...
Updates from The Center for Threat Informed Defense - Jon Baker
Go Go Ransom Rangers: Diving into Akira’s Linux Variant with ATT&CK - Nicole ...

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Encapsulation theory and applications.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPT
Teaching material agriculture food technology
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Approach and Philosophy of On baking technology
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
MYSQL Presentation for SQL database connectivity
Unlocking AI with Model Context Protocol (MCP)
Encapsulation theory and applications.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
NewMind AI Monthly Chronicles - July 2025
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Teaching material agriculture food technology
Chapter 3 Spatial Domain Image Processing.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
The AUB Centre for AI in Media Proposal.docx
Understanding_Digital_Forensics_Presentation.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
CIFDAQ's Market Insight: SEC Turns Pro Crypto

MITRE ATT&CK Updates: ICS

  • 1. MITRE ATT&CK® Updates: ICS Jake Steele: ICS ATT&CK Lead, MITRE © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
  • 2. Who am I? Part of ATT&CK for ICS’s original creation § Co-author to the ATT&CK for ICS philosophy https://my.aacsb.edu/Portals/0/assets/images/contact/George-Mason-University.png and have too many hobbies.. © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
  • 3. Why do we need an ATT&CK for ICS? Enterprise ATT&CK ICS ATT&CK Process Basic Control Area Control Operations Management Supervisory Control Enterprise Systems Level 5 Level 4 Level 3 Level 2 Level 1 Level 0 IT OT Source: Purdue Model, http://www.pera.net/Pera/PurdueReferenceModel/ReferenceModel.pdf © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
  • 4. What's different about ATT&CK for ICS? § Adversary motivations are different § Objective depends on target § Interaction with physical world § Technologies are different § Protocols vary by sector § Different ways of defending them © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
  • 5. Assets © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
  • 6. Why do we need Assets in ICS? § Lots of industries § Assets and their functional roles § Process context & physics § Different dependencies, concerns, names, and definitions https://advantidge.com/wp-content/uploads/2022/02/critical-infrastructure-security.png © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
  • 7. How we went about it 1. Identify based on CTI § Survey, much like mapping for techniques 2. Research and refine based on Industry standard definitions and names § NIST 800-82 § ISA 62443 § Device vendor documentation https://www.wired.com/images_blogs/threatlevel/2010/11/w32_stuxnet_dossier.pdf https://www.dragos.com/wp-content/uploads/TRISIS-01.pdf https://www.boozallen.com/content/dam/boozallen/documents/2016/09/ukraine-report-when-the-lights-went-out.pdf https://web-assets.esetstatic.com/wls/2017/06/Win32_Industroyer.pdf © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
  • 8. How we went about it 3. Perform analysis based on device features to associate with ATT&CK Techniques § Device Hardware § Wireless, USB, Modules, etc. § Software § Operating system(s), security features, § Architecture features § Network connectivity § Network Services § Intended Functional Role © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
  • 9. What it looks like © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
  • 10. What it looks like © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
  • 11. What it looks like © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
  • 12. How you can use this § Similar use cases to the rest of ATT&CK, we just removed some manual steps § Adversary emulation § Defense gap analysis § Cyber Threat Intelligence enrichment* § Failure scenario development § Educational resource § Augment your threat modeling efforts with an Asset-based focus § Utilize as a common lexicon for talking across industrial sectors or to describe risk to leadership § Underrepresented and unreported sectors © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
  • 13. What's Next § Include additional data related to Asset and Technique relationships § Engage with the community § Direct feedback about the current baseline § Interest in engaging with underrepresented sectors © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
  • 14. Applying Industry Standards to ATT&CK Techniques © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
  • 15. Original Understanding Based on Threat Reporting § Based on public reporting for ICS incidents this was the initial view: © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
  • 16. Applying PLC Standards to Improve Understanding § IEC 61131: Programmable controllers – Part 3: Programming languages § Defines the program languages used within PLC § Underlying structures that should built into the controllers © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
  • 17. Applying Standards to Mitigations Communicate defenses leveraging standards that the ICS community is already using § IEC 62443 3-3, 4-2 § NIST 800-53 © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
  • 18. The Future © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
  • 19. What’s next? § Improving cross-domain capability within ATT&CK § Continued campaign adoption § Triton next on the list § Expanding coverage of Asset sectors © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11.
  • 20. © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-11. https://attack.mitre.org attack@mitre.org @mitreattack Jake Steele