Question: 1 . 1 Version History Instructions for completing this template are given in red. Follow the instructions and then delete the red text. For 1
Version History
Instructions for completing this template are given in red. Follow the instructions and then delete the red text. For Version History, update the version history table for the data you are adding changes and delete the red text.
Version Change Date Changes and Description Editor Approval Date Approver
Initial Template Creation Steven Maestas SMM
Distribution
For this section, write a short of who should have access to this threat assessment
Introduction
Write a short introduction to what this document describes, ie annual MITRE ATT&CK threat assessment.
Purpose
Explain why this document is being written in sentences
Definitions
Include any definition for acronyms or terms that are needed to understand the rest of the document. Things like EDR, SOC, IR SIEM, SOAR, etc. should be defined here.
MITRE ATT&CK
Threat Assessment
Threat Actor
TTPs
Tactics
Techniques
Procedures
Etc.
Threat Assessment
Threat Actors
Give a brief introduction paragraph about the threat actors. List the threat actors and give a summary of each. Explain which threat actors pose the greatest risk to Bellevue Bank and Trust.
Tools
Give a brief introduction paragraph to the tools commonly used by the threat actors. List the tools and give a summary of each. Explain which TTPs are used by each tool.
Top MITRE ATT&CK
Write of a brief description of purpose of establishing an SLA, sentences.
Ransomware
List and summarize the MITRE Top Techniques used in ransomware.
Organizational TTPs
List and summarize the MITRE Top Techniques that are most likely to affect Bellevue Bank and Trust given the data we input into the MITRE Top calculator.
MITRE Sightings Report
A brief description of the MITRE Sightings Report.
Most Observed Techniques
List and summarize the most observed techniques from the MITRE Sightings Report.
DeTT&CT
Summarize the purpose and use of the DeTT&CT projecteditors
DeTT&CT Process and Results
Summarize the process you used to generate the DeTT&CT YAML. Summarize the detection coverages based on the colored matrix you uploaded to the Navigator Dett&CTjson
Mitigations
Summarize the process of adding mitigations to the MITRE ATT&CK Navigator and how Navigator maps the mitigations to techniques.
Mitigation Results
List and briefly summarize the techniques that are mitigated based on the controls.
Gap Analysis
Summarize the steps you took to generate the Gap Analysis based on the five layers you added to attack navigator.
Gap Analysis Results
Summarize the findings of the Gap Analysis results based on the last computed layer you generated. Which techniques should be concerned about based on the scoring? Which ones have the list visibility and mitigations?
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
