SlideShare a Scribd company logo
Tracking &
Measuring
ATT&CK
coverage with
attack2jira
Mauricio Velazco
@mvelazco
https://github.com/mvelazc0/
Requirements
✘ Manage ATT&CK
techniques as entities
✘ Track state/maturity over
time
✘ Interface that allows
collaboration: log work,
attach documentation,
comments, etc.
✘ Basic reporting
Attack2jira
✘ Leverages JIRA’s Api and Roberto’s attackcti library
(https://github.com/hunters-forge/ATTACK-Python-Client)
✘ Automates the process of setting up a JIRA project that can
be used to track and measure ATT&CK coverage:
✘ Creates a JIRA Project
✘ Creates custom fields: url, tactic & maturity.
✘ Hides unnecessary fields
✘ Creates JIRA issues for each ATT&CK technique
Demo 1
Demo 2
Tracking &
Measuring
ATT&CK
coverage with
attack2jira
Mauricio Velazco
@mvelazco
https://github.com/mvelazc0/
https://github.com/mvelazc0/attack2jira

More Related Content

PDF
MITRE ATT&CKcon 2.0: Ready to ATT&CK? Bring Your Own Data (BYOD) and Validate...
PDF
MITRE ATT&CKcon 2018: VCAF: Expanding the ATT&CK Framework to cover VERIS Thr...
PDF
MITRE ATT&CKcon 2018: Sofacy 2018 and the Adversary Playbook, Robert Falcone,...
PPTX
BSidesLV -The SOC Counter ATT&CK
PDF
MITRE ATT&CKcon 2.0: Flashback with ATT&CK: Exploring Malware History with AT...
PDF
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
PDF
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
PDF
MITRE ATTACKCon Power Hour - December
MITRE ATT&CKcon 2.0: Ready to ATT&CK? Bring Your Own Data (BYOD) and Validate...
MITRE ATT&CKcon 2018: VCAF: Expanding the ATT&CK Framework to cover VERIS Thr...
MITRE ATT&CKcon 2018: Sofacy 2018 and the Adversary Playbook, Robert Falcone,...
BSidesLV -The SOC Counter ATT&CK
MITRE ATT&CKcon 2.0: Flashback with ATT&CK: Exploring Malware History with AT...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATTACKCon Power Hour - December

What's hot (19)

PDF
MITRE ATT&CKcon 2.0: The World's Most Dangerous ATT&CKers; Robert Lipovsky, ESET
PPTX
Leveraging MITRE ATT&CK - Speaking the Common Language
PDF
Using ATTACK to Create Cyber DBTS for Nuclear Power Plants
PDF
Helping Small Companies Leverage CTI with an Open Source Threat Mapping
PDF
MITRE ATT&CKcon 2018: Detection Philosophy, Evolution & ATT&CK, Fred Stankows...
PDF
MITRE ATT&CKcon 2018: Playing Devil’s Advocate to Security Initiatives with A...
PDF
MITRE ATT&CKcon 2.0: attckr - A Toolkit for Analysis and Visualization of ATT...
PDF
MITRE ATT&CKcon 2018: Building an Atomic Testing Program, Brian Beyer, Red Ca...
PDF
Sharpening your Threat-Hunting Program with ATTACK Framework
PDF
Attack eu 2021 attack4cvc
PDF
ATT&CKING Containers in The Cloud
PDF
MITRE ATTACKcon Power Hour - October
PPTX
Ending the Tyranny of Expensive Security Tools
PDF
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
PDF
MITRE AttACK framework it is time you took notice_v1.0
PDF
Inside Cybercrime Groups Harvesting Active Directory for Fun and Profit - Vit...
PDF
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx
PPTX
Threat Hunting at Scale
PDF
MITRE ATT&CKcon 2018: ATT&CK: All the Things, Neelsen Cyrus and David Thompso...
MITRE ATT&CKcon 2.0: The World's Most Dangerous ATT&CKers; Robert Lipovsky, ESET
Leveraging MITRE ATT&CK - Speaking the Common Language
Using ATTACK to Create Cyber DBTS for Nuclear Power Plants
Helping Small Companies Leverage CTI with an Open Source Threat Mapping
MITRE ATT&CKcon 2018: Detection Philosophy, Evolution & ATT&CK, Fred Stankows...
MITRE ATT&CKcon 2018: Playing Devil’s Advocate to Security Initiatives with A...
MITRE ATT&CKcon 2.0: attckr - A Toolkit for Analysis and Visualization of ATT...
MITRE ATT&CKcon 2018: Building an Atomic Testing Program, Brian Beyer, Red Ca...
Sharpening your Threat-Hunting Program with ATTACK Framework
Attack eu 2021 attack4cvc
ATT&CKING Containers in The Cloud
MITRE ATTACKcon Power Hour - October
Ending the Tyranny of Expensive Security Tools
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE AttACK framework it is time you took notice_v1.0
Inside Cybercrime Groups Harvesting Active Directory for Fun and Profit - Vit...
[HITCON 2020 CTI Village] Threat Hunting and Campaign Tracking Workshop.pptx
Threat Hunting at Scale
MITRE ATT&CKcon 2018: ATT&CK: All the Things, Neelsen Cyrus and David Thompso...
Ad

Similar to MITRE ATT&CKcon 2.0: Tracking and Measuring ATT&CK Coverage with ATTACK2Jira (Lightning Talk); Mauricio Velazco (9)

PDF
ATT&CKcon 2.0 2019 - Tracking and measuring your ATT&CK coverage with ATT&CK2...
PDF
This is why we don’t shout “Bingo”: Analyzing ATT&CK Integration in Endpoint ...
PPTX
ATT&CKing Threat Management
PDF
Sources of ATT&CK: A Bibliographic Journey through Enterprise ATT&CK - Robert...
PDF
From Theory to Practice: How My ATTACK Perspectives Have Changed
PDF
The ATT&CK Philharmonic
PDF
Mitre getting-started-with-attack-october-2019
PPTX
PDF
MITRE A-TAK Design Philosophy
ATT&CKcon 2.0 2019 - Tracking and measuring your ATT&CK coverage with ATT&CK2...
This is why we don’t shout “Bingo”: Analyzing ATT&CK Integration in Endpoint ...
ATT&CKing Threat Management
Sources of ATT&CK: A Bibliographic Journey through Enterprise ATT&CK - Robert...
From Theory to Practice: How My ATTACK Perspectives Have Changed
The ATT&CK Philharmonic
Mitre getting-started-with-attack-october-2019
MITRE A-TAK Design Philosophy
Ad

More from MITRE - ATT&CKcon (20)

PDF
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
PDF
State of the ATTACK
PDF
ATTACK-Onomics: Attacking the Economics Behind Techniques Used by Adversaries
PDF
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...
PDF
MITRE ATTACKcon Power Hour - January
PDF
What's New with ATTACK for ICS?
PDF
Putting the PRE into ATTACK
PDF
What's a MITRE with your Security?
PDF
ATTACKing the Cloud: Hopping Between the Matrices
PDF
Mapping the EventBot Mobile Banking Trojan with MITRE ATTACK for Mobile
PDF
Transforming Adversary Emulation Into a Data Analysis Question
PDF
TA505: A Study of High End Big Game Hunting in 2020
PDF
Using MITRE PRE-ATTACK and ATTACK in Cybercrime Education and Research
PDF
What's New with ATTACK for Cloud?
PDF
Starting Over with Sub-Techniques
PDF
MITRE ATT&CKcon Power Hour - November
PDF
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
PDF
MITRE ATT&CKcon 2.0: Keynote Address - The Friends We Made Along the Way; Ton...
PDF
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
PDF
MITRE ATT&CKcon 2.0: Alertable Techniques for Linux Using ATT&CK; Tony Lamber...
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
State of the ATTACK
ATTACK-Onomics: Attacking the Economics Behind Techniques Used by Adversaries
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...
MITRE ATTACKcon Power Hour - January
What's New with ATTACK for ICS?
Putting the PRE into ATTACK
What's a MITRE with your Security?
ATTACKing the Cloud: Hopping Between the Matrices
Mapping the EventBot Mobile Banking Trojan with MITRE ATTACK for Mobile
Transforming Adversary Emulation Into a Data Analysis Question
TA505: A Study of High End Big Game Hunting in 2020
Using MITRE PRE-ATTACK and ATTACK in Cybercrime Education and Research
What's New with ATTACK for Cloud?
Starting Over with Sub-Techniques
MITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
MITRE ATT&CKcon 2.0: Keynote Address - The Friends We Made Along the Way; Ton...
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
MITRE ATT&CKcon 2.0: Alertable Techniques for Linux Using ATT&CK; Tony Lamber...

Recently uploaded (20)

PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Getting Started with Data Integration: FME Form 101
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Approach and Philosophy of On baking technology
PDF
cuic standard and advanced reporting.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Electronic commerce courselecture one. Pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Building Integrated photovoltaic BIPV_UPV.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Getting Started with Data Integration: FME Form 101
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Approach and Philosophy of On baking technology
cuic standard and advanced reporting.pdf
Spectroscopy.pptx food analysis technology
NewMind AI Weekly Chronicles - August'25-Week II
Programs and apps: productivity, graphics, security and other tools
Reach Out and Touch Someone: Haptics and Empathic Computing
Electronic commerce courselecture one. Pdf
Big Data Technologies - Introduction.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
20250228 LYD VKU AI Blended-Learning.pptx
Encapsulation theory and applications.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Machine learning based COVID-19 study performance prediction
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...

MITRE ATT&CKcon 2.0: Tracking and Measuring ATT&CK Coverage with ATTACK2Jira (Lightning Talk); Mauricio Velazco