The Zurich release has arrived! Interested in new features and functionalities? Click here for more

Sebastiaan
ServiceNow Employee
ServiceNow Employee

ServiceNow released a new Security Incident Response integration with the MITRE ATT&CK framework. This article will provide a high-level overview of its purpose and capabilities.

The MITRE ATT&CK framework provides a knowledge base of common tactics, techniques, and procedures (TTP) organizations can access to develop threat models and methodologies against cyberattacks.

By combining this framework with SecOps Incident Response, organizations are enabled to use MITRE information to:

  • Speedup the analysis of Security Incidents by leveraging the mapping of TTP’s
  • Obtain detection coverage insight of MITRE techniques
  • Improve threat hunting capabilities by leveraging relations between TTP’s, SIR’s & observable

Speedup the analysis of Security Incidents by leveraging the mapping of TTP’s

Upon enabling the Threat Intelligence module within Security Incidents Response, MITRE techniques can get automatically or manually related to Security Incidents and Observables. By creating these relations, analysts can leverage the imbedded MITRE ATT&CK view to understand the potential phase of an attack and learn about related TTP’s. This information can then be used to determine:

  • Additional investigative actions
  • “forensic” proof to look for
  • Necessary remediation or mitigative actions

Furthermore, by linking MITRE TTP’s to Security Runbooks, SOC’s can automatically populated required response tasks based linked TTP’s.

Below screenshots briefly demonstrate these capabilities:

find_real_file.png

MITRE ATT&CK Card Navigator view

find_real_file.png

MITRE ATT&CK Card list view

find_real_file.png

Detailed TTP relations view

Obtain detection coverage insight of MITRE techniques

As organizations embrace the usage of MITRE TTP’s for the development of detection models and rules, it has also become vital to understand the effectiveness and gaps of these.

For this purpose, the MITRE ATT&CK integration provides the ability to map tactics & techniques to:

  • Your detection tools such as; SIEM, EDR, Proxy Server etc.
  • (SIEM) detections rules ingested from for example; Splunk, Sentinel, Qradar etc.

When organization additionally rate their expected coverages per MITRE technique, the built-in MITRE heatmap can be leveraged to provide inside into the actual coverage levels and list the relations with existing Security Incidents, Observables and Detection Rules. An impression of this is demonstrated in below screenshots:

find_real_file.png

MITRE ATT&CK Navigator heatmap 1-2

find_real_file.png

MITRE ATT&CK Navigator heatmap 2-2

Based on these heatmaps organizations can better determine the effectives of detection models and properly identify points for improvement.

Improve threat hunting capabilities by leveraging relations between TTP’s, SIR’s & observables

When organizations track TTP’s in relation to Security Incidents and Observables it generates an interesting dataset for performing threat hunting activities on. By proactively searching this continuously updated dataset, TI teams could for example:

Check for the existence of IOC’s of interests
Obtain statistics about the volumes and types of detected TTP’s, SIR’s and Observables
Determine the effectiveness of the existing detection rules

As the MITRE ATT@CK integration comes with OOTB search filters, SOC and TI teams can quickly leverage these to search the dataset on for example:

  • MITRE-ATT&CK Adversary Group
  • MITRE-ATT&CK Data Source
  • MITRE-ATT&CK Procedure (Malware)
  • MITRE-ATT&CK Procedure (Tools)
  • MITRE-ATT&CK Tactic
  • MITRE-ATT&CK Technique

As these filters are also available within the reporting engine, they can also be leveraged for the creation specific dashboard/reporting widgets.

find_real_file.png

MITRE filter options

I hope this article provided a good overview of the capabilities of the new MITRE integration with ServiceNow Security Incident Response. If you are interested to learn more, please use below link.

https://docs.servicenow.com/bundle/paris-security-management/page/product/threat-intelligence/concep...

 
Comments
Alex Cox
ServiceNow Employee
ServiceNow Employee

 

Thank you for this review Sebastiaan!  I am sure the community will find it very helpful.

I believe these new features will be game changing for users of our Threat Intelligence application. 🙂

DeepakH0
ServiceNow Employee
ServiceNow Employee

Sebastiaan - Great overview of this strategic update to Security Incident Response and Threat Intelligence !

Note that the following store applications and their dependencies deliver this functionality :

Threat Intelligence Support Common UI Components - Version 1.0.0 (Installed as a dependency when you update Threat Intelligence)

Threat Intelligence - Version 12.0.0

Threat Intelligence support Common - Version 12.0.0

Security Incident Response - Version 12.0.0

Supported platform versions: Orlando , Paris & Quebec (when GA)

Version history
Last update:
‎12-18-2020 10:12 AM
Updated by: