Russia, Moscow 1/1 Vasilisa Kozhina Str.,
Business center Park Pobedy
Monitoring of attackers' techniques is a constant resistance of armor and shell. If a list of tactics and techniques, such as MITRE ATT&CK® Enterprise, is taken – it’s an uphill task even for organizations with large SOC departments to carry out high-quality monitoring of more than 200 techniques (and even more sub-techniques and procedures) in the foreseeable future. Many ideas for correlation rules have long been published in the public domain, but adapting them to the specific IT landscape, cyber security policies and service workflows is not a quick and complex task, which is better left to professionals.
Creation and implementation of a list of highest priority attack techniques for your organization as correlation rules and incident response plans based on actual MITRE ATT&CK® incident investigation reports and other relevant threats database. The service can provide an iterative approach – when the SOC is ready to monitor extra threats or on a periodic basis.
Surveying existing infrastructure, processes, requirements gathering
Creating a list of most relevant techniques to be monitored
Developing correlation rules
Developing response scenarios
Repeating steps 1-4
Let’s talk how to improve the security and efficiency of your IT and cyber security systems.