Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

MITRE Adds D3FEND Countermeasures to ATT&CK Framework

The U.S. government’s National Security Agency (NSA) on Tuesday announced plans to fund the development of a knowledge base of defensive countermeasures for the most common techniques used by malicious hackers.

The U.S. government’s National Security Agency (NSA) on Tuesday announced plans to fund the development of a knowledge base of defensive countermeasures for the most common techniques used by malicious hackers.

The project, called D3FEND, is available through the non-profit MITRE Corporation as a catalog of defensive cybersecurity techniques and their relationships to offensive/adversary techniques. 

The primary goal of the initial D3FEND release is to help standardize the vocabulary used to describe defensive cybersecurity technology functionality.

Mitre described D3FEND as an “early stage experimental research project” with the primary goal of helping to standardize the vocabulary used to describe defensive cybersecurity technology functionality.

In a statement, the NSA said D3FEND establishes terminology of computer network defensive techniques and illuminates previously-unspecified relationships between defensive and offensive methods. 

“This framework illustrates the complex interplay between computer network architectures, threats, and cyber countermeasures,” the agency said.

[ Related: ATT&CK v9 Introduces Containers, Google Workspace ]

The MITRE Corporation released D3FEND as a complement to its existing ATT&CK framework, which is widely used as the knowledge base of cyber adversary tactics and techniques based on real-world observations.

Advertisement. Scroll to continue reading.

“Complementary to the threat-based ATT&CK model, D3FEND provides a model of ways to counter common offensive techniques, enumerating how defensive techniques impact an actor’s ability to succeed. By framing computer network defender complexity of countermeasure functions and techniques as granularly as ATT&CK frames computer network attacker techniques, D3FEND enables cybersecurity professionals to tailor defenses against specific cyber threats, thereby reducing a system’s potential attack surface,” the NSA said.

“As a result, D3FEND will drive more effective design, deployment, and defense of networked systems writ large,” the agency added.

A technical paper (pdf) was also released to explain the problem and propose D3FEND as a “precise, unambiguous, and information-dense knowledge graph of cybersecurity countermeasures.”

Related: ATT&CK v9 Introduces Containers, Google Workspace

Related: ATT&CK Framework to Evaluate Enterprise Security Products

Related: MITRE ATT&CK Used for Cybersecurity Skills Development

Related: Where To Begin With MITRE ATT&CK Matrix

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Gain valuable insights from industry professionals who will help guide you through the intricacies of industrial cybersecurity.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.