Skip to content

Commit 6fa02eb

Browse files
michaelcretzmannico-marioncswatt
authored
MITRE ATT&CK map content updated for new product support (#30969)
Co-authored-by: Nicolas Marion <[email protected]> Co-authored-by: cecilia saixue watt <[email protected]>
1 parent 442dd3a commit 6fa02eb

File tree

1 file changed

+28
-1
lines changed

1 file changed

+28
-1
lines changed

content/en/security/detection_rules/_index.md

Lines changed: 28 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,9 @@ products:
2828
- name: App and API Protection
2929
url: /security/application_security/
3030
icon: app-sec
31+
- name: Workload Protection
32+
url: /security/workload_protection/
33+
icon: cloud-security-management
3134
---
3235

3336
{{< product-availability >}}
@@ -43,10 +46,31 @@ Out-of-the box rules are available for the following security products:
4346
- [Cloud SIEM][3] uses log detection to analyze ingested logs in real-time.
4447
- Cloud Security:
4548
- [Cloud Security Misconfigurations][4] uses cloud configuration and infrastructure configuration detection rules to scan the state of your cloud environment.
46-
- [Workload Protection][5] uses the Datadog Agent and detection rules to actively monitor and evaluate system activity.
4749
- [Cloud Security Identity Risks][6] uses detection rules to detect IAM-based risks in your cloud infrastructure.
50+
- [Workload Protection][5] uses the Datadog Agent and detection rules to actively monitor and evaluate system activity.
4851
- [App and API Protection][7] (AAP) leverages Datadog [APM][8], the [Datadog Agent][9], and detection rules to detect threats in your application environment.
4952

53+
## MITRE ATT&CK map
54+
55+
{{< product-availability names="Cloud SIEM,App and API Protection,Workload Protection" >}}
56+
57+
MITRE ATT&CK is a framework that helps organizations understand how cyber attackers operate. It maps the following:
58+
59+
- **Tactics:** The "why" of an attack. These are the high-level goals, like gaining initial access, executing malicious code, or stealing data.
60+
- **Techniques:** The "how" of an attack. These are the specific actions an attacker takes to achieve a tactic, like using phishing to get into a system or exploiting a vulnerability in software.
61+
62+
By mapping tactics and techniques, MITRE ATT&CK provides security teams with a common language to communicate threats and better prepare defenses.
63+
64+
To use the MITRE ATT&CK map, do the following:
65+
66+
1. Open Detection Rules in [SIEM][16] or [Workload Protection][17].
67+
2. Select **MITRE ATT&CK map**.
68+
3. Select one of more products in the filter <i class="icon-filter"></i>.
69+
4. Review the map for the following:
70+
- Assessing Coverage: Determine which attack techniques are well-covered and which are under-monitored.
71+
- Prioritizing Rule Creation: Focus on creating detection rules for techniques with low or no coverage.
72+
- Streamlining Rule Management: Manage and update detection rules, ensuring they align with the latest threat intelligence.
73+
The MITRE ATT&CK map available in SIEM or Workload Protection, but you can select Application and API Protection in the filter. Application and API Protection is included in the MITRE ATT&CK map for all-inclusive security coverage.
5074
## Beta detection rules
5175

5276
Datadog's Security Research team continually adds new OOTB security detection rules. While the aim is to deliver high quality detections with the release of integrations or other new features, the performance of the detection at scale often needs to be observed before making the rule generally available. This gives Datadog's Security Research the time to either refine or deprecate detection opportunities that do not meet our standards.
@@ -175,3 +199,6 @@ The rule deprecation process is as follows:
175199
[13]: /security/cloud_security_management/misconfigurations/custom_rules
176200
[14]: /security/workload_protection/workload_security_rules?tab=host#create-custom-rules
177201
[15]: https://app.datadoghq.com/security/configuration/
202+
[16]: https://app.datadoghq.com/security/rules
203+
[17]: https://app.datadoghq.com/security/workload-protection/detection-rules
204+

0 commit comments

Comments
 (0)