1 of 20

�Need for Security: Simulation

Simon Howe - Regional Director, Asia Pacific & Japan

Brett Callaughan – Technical Director, Asia Pacific & Japan

2 of 20

2 ways to determine the effectiveness of your security program…

You can do it

or

Your adversary can do it

3 of 20

Does This Sound Familiar?

Core challenges…

Massive Escalation �in Threats

People Problem

Cybersecurity

Tools Sprawl

Biz/Board<>IT Security Communication Challenges

4 of 20

AttackIQ – what we do

Security Control Validation

Test your security controls to validate their effectiveness.

Cloud Security

Validate cloud security effectiveness for AWS, Azure, and third-party cloud security providers (next generation firewalls, micro-segmentation, endpoint detection and response).

MITRE ATT&CK

Leverage a library of scenarios aligned to the MITRE ATT&CK framework of known adversary tactics, techniques, and procedures.

Compliance�Align threat and risk management frameworks (i.e., NIST 800-53, CMMC, PCI with MITRE ATT&CK) to validate compliance effectiveness.

AttackIQ Security Optimisation Platform

A breach and attack simulation (BAS) platform that tests your security program by emulating the adversary at scale and continuously.

5 of 20

AttackIQ – what we do

6 of 20

Automate MITRE ATT&CK Framework

© 2021 AttackIQ, Inc. All rights reserved. Confidential and proprietary. Do not distribute.

Adversarial Tactics,�Techniques & Common�Knowledge

7 of 20

AttackIQ Leading The Way

The Center brings together the best security teams from around the world to identity and solve the most-pressing problems facing cyber defenders.

https://ctid.mitre-engenuity.org/

https://attack.mitre.org/

8 of 20

AttackIQ Academy 33,000+ Cybersecurity Students from 180+ countriesPractice Creation + Community

https://academy.attackiq.com/

https://academy.attackiq.com/courses/beyond-atomic-testing-with-attack-flows

NN-SD79LSQPQ

NN-SD79LSQPQ

9 of 20

AttackIQ Architecture

Direct API

Communication

TLS via TCP port 443

AttackIQ

Integration Manager

Integrations Communications

Utilize Native API’s

Security

Technology

SIEM

Customer Browser

PLATFORM

Management WEBUI

TLS via TCP port 443

REST API

TLS via TCP port 443

Windows

Windows 7

Windows 8.X

Windows 10

Windows 2008

Windows 2012

Windows 2016

Windows 2019

macOS

Sierra

High Sierra

Catalina

Big Sur

Monterey

Linux

Amazon Linux

Amazon Linux 2

Ubuntu 14.04+ LTS

Redhat 6+

Centos 6+

SUSE Linux

IBM zLinux

SIEM API COMMUNICATION

TLS via TCP port 443

x64 & M1

Win32 & x64

x64

10 of 20

AttackIQ Architecture (Prevention)

Management Web Interface�Accessible via Web Brower

Platform

TLS via TCP port 443

REST API

TLS via TCP port 443

TLS via TCP port 443

Windows

Windows 7

Windows 8.X

Windows 10

Windows 2008

Windows 2012

Windows 2016

Windows 2019

macOS

Sierra

High Sierra

Catalina

Big Sur

Monterey

Linux

Amazon Linux

Amazon Linux 2

Ubuntu 14.04+ LTS

Redhat 6+

Centos 6+

SUSE Linux

IBM zLinux

x64 & M1

Win32 & x64

x64

11 of 20

AttackIQ Integrations (Detection)

Direct API

Native Technology API Communication

AttackIQ

Integration Manager

Security

Technology

SIEM

SIEM

Native SIEM API Communication

PLATFORM

TLS via TCP port 443

TLS via TCP port 443

12 of 20

AttackIQ Agent Architecture

AttackIQ

Management server

AttackIQ Agent Communications Agent Initiates Communication

TLS via TCP port 443

AttackIQ Threat Cloud Infrastructure

Attack Communications

Scenarios can initiate communications through the customer’s boundary to specified destinations on the Internet or to AttackIQ staged infrastructure.

ATTACKIQ AGENTS

AGENT

ATTACK

Interval Check-Ins to Management Server

Execute Assigned Scenarios

Activate Attack Module

Generate Detailed Logging

Collect and Submit Results and Logs

Boundary Infrastructure

Firewall \ IDS \ Content Filter \ DLP

Attack Communications

Scenarios can initiate communications to internal infrastructure and systems, emulating adversarial behaviors to test applicable security controls.

Internet

13 of 20

YOUR TELEMETRY IS ONLY AS GOOD AS YOUR DATA SOURCES

Agents

Users

PROXY

IoT Devices

What are your data sources? What are your gaps? �What are the associated business risks due to these gaps?

14 of 20

GARTNER SOC VISIBILITY TRIAD: NDR, SIEM, AND EDR

SIEM

EDR

The Cyber Triad

NDR

COMPLETE VISIBILITY

REAL-TIME DETECTION

INTELLIGENT RESPONSE

Network-based detection tools got the highest levels of satisfaction when compared against other detection approaches.

2019 SANS SOC SURVEY RESULTS

15 of 20

  • Founded in 2007 Headquarter in Seattle, USA
  • Co-founders Jesse Rothstein & Raja Mukerji were formally senior engineers at F5 Networks & architects of BIG-IP v9
  • Trusted by the world’s leading enterprises to delivery visibility, detection, and investigation at scale
  • 800 customers, 5,000+ deployments, 5 million assets protected
  • Innovator in machine learning and analytics
  • Leaders in Gartner MQ and EMA Radar

INDUSTRY ACCOLADES

KEY ANZ CUSTOMERS

16 of 20

HOW DOES IT WORK?

17 of 20

EXAMPLE: DISTRIBUTED DEPLOYMENT (SENSORS)

VPC Traffic Mirroring

EC2: Apache

ExtraHop Cloud:

ML, Record Store, Control Plane

EC2: MS SQL Database

EC2: Reveal(x) AMI

AWS VPC

SPAN

AD

DNS

Reveal(x) Sensor

Branch

SPAN | ERSPAN | TAP Agg.

DNS

Storage

Reveal(x) Sensor

On-prem DC (1)

SPAN | ERSPAN | TAP Agg.

DNS

Storage

Reveal(x) Sensor

On-prem DC (2)

18 of 20

19 of 20

20 of 20