- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
The MITRE ATT&CK Framework is a knowledge base used to develop specific threat models and methodologies. Use the Cloud SIEM ATT&CK Map to explore and visualize the MITRE ATT&CK Framework against Datadog’s out-of-the-box rules and your custom detection rules. The ATT&CK Map displays detection rule density as a heat map to provide visibility into attacker techniques. Your security teams can use the heat map to assess gaps in coverage that is relevant to their organization or team and prioritize improvements to their detection rule defenses.
To view detection rules against the MITRE ATT&CK Framework:
The default view of the map shows all Datadog out-of-the-box and custom rules for active sources, broken down into different attack techniques. Active sources are the sources of logs found and analyzed in the Cloud SIEM index.
Note: For the legacy SKU, all ingested logs are analyzed by Cloud SIEM unless security filters have been set up.
To view the map for all sources, in the Visualize dropdown menu, select All Sources. This shows all out-of-the-box rules, including those that are not currently used to detect threats from your logs.
Click the rule density buttons to visualize the map for a specific number of rules. For example, if you click High +7, only tiles that have more than seven rules enabled are shown on the map.
To view more information about a technique and the rules monitoring the technique:
Custom rules only show up in the map if they are tagged in the rule editor with the correct MITRE tactic and technique. The tactic and technique must also be paired correctly. If the correct format and pairing are not used, the rule does not show up in the map when you use the search bar to filter for that rule.
This is an example of the format you need to use for tagging custom rules and the correct pairing of tactic and technique tags:
tactic: <tactic number>-<tactic name>
tactic:TA0001-Initial-Access
technique: <technique number>-<technique name>
technique:T1566-Phishing
Note: The tactic and technique need to be based on the MITRE ATT&CK version stated on the ATT&CK Map page.
추가 유용한 문서, 링크 및 기사: