Mitigant Threat Catalog: 3x Techniques, 12 AWS Services Added, and a Matrix View
About a month ago, we launched the Mitigant Threat Catalog, a free, interactive resource that operationalizes MITRE ATT&CK cloud techniques into executable CLI commands, CloudTrail event mappin...

Source: DEV Community
About a month ago, we launched the Mitigant Threat Catalog, a free, interactive resource that operationalizes MITRE ATT&CK cloud techniques into executable CLI commands, CloudTrail event mappings, and Cloud Attack Language definitions. The catalog launched with 30 techniques across 20 AWS services. We recently made a major update, and we are excited to describe these changes, including how you can contribute or send feedback. We would also discuss some interesting observations we noticed, and where the catalog is headed. The Gap We Are Closing Most users of the MITRE ATT&CK framework realize that it is deliberately abstract. It is designed as a framework for categorizing adversary behavior and, given its aim of universal applicability, requires end users to provide contextual interpretation. But that is exactly where a gap is introduced: translating high-level content into operational capabilities. Consider T1078.004 (Valid Accounts: Cloud Accounts). The framework tells you tha