Splunk Enterprise Security

Splunk Enterprise Security

joomla
Engager

Hi Community Members,

Anyone knows whether we can use Splunk Enterprise Security to map our correlation searches against MITRE Tactics and Techniques without installing more apps like MITRE Dashboard or Splunk Security Essentials.

This mapping can help to see what security coverages we have and what requires improvements.

 

Many Thanks in advance.

0 Karma

aasabatini
Motivator

Hi @joomla 

one suggestion,  to use the mitre attck matrix without the security essentials and mitre dashboard is:

create a lookup table to map the mitre matrix, one column for the codes, another one for the names of the attack and other one for the description.

insert in your correlation rule a code field with the code in which the attack is mapped

example:

I created a correlation rule for the log4j vulnerability on my correlation search I will create this field

eval code= "CVE-2021-44228"

after this correlate the search with the lookup with the lookup command

---- your correlation search----
|lookup mitre.csv code
---end of your correlation search

hope can help

“The answer is out there, Neo, and it’s looking for you, and it will find you if you want it to.”
0 Karma
Get Updates on the Splunk Community!

Thanks for the Memories! Splunk University, .conf24, and Community Connections

Thank you to everyone in the Splunk Community who joined us for .conf24 – starting with Splunk University and ...

.conf24 | Day 0

Hello Splunk Community! My name is Chris, and I'm based in Canberra, Australia's capital, and I travelled for ...

Enhance Security Visibility with Splunk Enterprise Security 7.1 through Threat ...

 (view in My Videos)Struggling with alert fatigue, lack of context, and prioritization around security ...