�Need for Security: Simulation
Simon Howe - Regional Director, Asia Pacific & Japan
Brett Callaughan – Technical Director, Asia Pacific & Japan
2 ways to determine the effectiveness of your security program…
You can do it
or
Your adversary can do it
Does This Sound Familiar?
Core challenges…
Massive Escalation �in Threats
People Problem
Cybersecurity
Tools Sprawl
Biz/Board<>IT Security Communication Challenges
AttackIQ – what we do
Security Control Validation
Test your security controls to validate their effectiveness.
Cloud Security
Validate cloud security effectiveness for AWS, Azure, and third-party cloud security providers (next generation firewalls, micro-segmentation, endpoint detection and response).
MITRE ATT&CK
Leverage a library of scenarios aligned to the MITRE ATT&CK framework of known adversary tactics, techniques, and procedures.
Compliance�Align threat and risk management frameworks (i.e., NIST 800-53, CMMC, PCI with MITRE ATT&CK) to validate compliance effectiveness.
AttackIQ Security Optimisation Platform
A breach and attack simulation (BAS) platform that tests your security program by emulating the adversary at scale and continuously.
AttackIQ – what we do
Automate MITRE ATT&CK Framework
© 2021 AttackIQ, Inc. All rights reserved. Confidential and proprietary. Do not distribute.
Adversarial Tactics,�Techniques & Common�Knowledge
AttackIQ Leading The Way
The Center brings together the best security teams from around the world to identity and solve the most-pressing problems facing cyber defenders.
https://ctid.mitre-engenuity.org/
https://attack.mitre.org/
AttackIQ Academy 33,000+ Cybersecurity Students from 180+ countries�Practice Creation + Community
https://academy.attackiq.com/
https://academy.attackiq.com/courses/beyond-atomic-testing-with-attack-flows
NN-SD79LSQPQ
NN-SD79LSQPQ
AttackIQ Architecture
Direct API
Communication
TLS via TCP port 443
AttackIQ
Integration Manager
Integrations Communications
Utilize Native API’s
Security
Technology
SIEM
Customer Browser
PLATFORM
Management WEBUI
TLS via TCP port 443
REST API
TLS via TCP port 443
Windows
Windows 7
Windows 8.X
Windows 10
Windows 2008
Windows 2012
Windows 2016
Windows 2019
macOS
Sierra
High Sierra
Catalina
Big Sur
Monterey
Linux
Amazon Linux
Amazon Linux 2
Ubuntu 14.04+ LTS
Redhat 6+
Centos 6+
SUSE Linux
IBM zLinux
SIEM API COMMUNICATION
TLS via TCP port 443
x64 & M1
Win32 & x64
x64
AttackIQ Architecture (Prevention)
Management Web Interface�Accessible via Web Brower
Platform
TLS via TCP port 443
REST API
TLS via TCP port 443
TLS via TCP port 443
Windows
Windows 7
Windows 8.X
Windows 10
Windows 2008
Windows 2012
Windows 2016
Windows 2019
macOS
Sierra
High Sierra
Catalina
Big Sur
Monterey
Linux
Amazon Linux
Amazon Linux 2
Ubuntu 14.04+ LTS
Redhat 6+
Centos 6+
SUSE Linux
IBM zLinux
x64 & M1
Win32 & x64
x64
AttackIQ Integrations (Detection)
Direct API
Native Technology API Communication
AttackIQ
Integration Manager
Security
Technology
SIEM
SIEM
Native SIEM API Communication
PLATFORM
TLS via TCP port 443
TLS via TCP port 443
AttackIQ Agent Architecture
AttackIQ
Management server
AttackIQ Agent Communications Agent Initiates Communication
TLS via TCP port 443
AttackIQ Threat Cloud Infrastructure
Attack Communications
Scenarios can initiate communications through the customer’s boundary to specified destinations on the Internet or to AttackIQ staged infrastructure.
ATTACKIQ AGENTS
AGENT
ATTACK
Interval Check-Ins to Management Server
Execute Assigned Scenarios
Activate Attack Module
Generate Detailed Logging
Collect and Submit Results and Logs
Boundary Infrastructure
Firewall \ IDS \ Content Filter \ DLP
Attack Communications
Scenarios can initiate communications to internal infrastructure and systems, emulating adversarial behaviors to test applicable security controls.
Internet
YOUR TELEMETRY IS ONLY AS GOOD AS YOUR DATA SOURCES
Agents
Users
PROXY
IoT Devices
What are your data sources? What are your gaps? �What are the associated business risks due to these gaps?
GARTNER SOC VISIBILITY TRIAD: NDR, SIEM, AND EDR
SIEM
EDR
The Cyber Triad
NDR
COMPLETE VISIBILITY
REAL-TIME DETECTION
INTELLIGENT RESPONSE
Network-based detection tools got the highest levels of satisfaction when compared against other detection approaches.
“
2019 SANS SOC SURVEY RESULTS
“
INDUSTRY ACCOLADES
KEY ANZ CUSTOMERS
HOW DOES IT WORK?
EXAMPLE: DISTRIBUTED DEPLOYMENT (SENSORS)
VPC Traffic Mirroring
EC2: Apache
ExtraHop Cloud:
ML, Record Store, Control Plane
EC2: MS SQL Database
EC2: Reveal(x) AMI
AWS VPC
SPAN
AD
DNS
Reveal(x) Sensor
Branch
SPAN | ERSPAN | TAP Agg.
DNS
Storage
Reveal(x) Sensor
On-prem DC (1)
SPAN | ERSPAN | TAP Agg.
DNS
Storage
Reveal(x) Sensor
On-prem DC (2)