{"id":105165,"date":"2022-01-27T10:00:00","date_gmt":"2022-01-27T18:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=105165"},"modified":"2023-05-15T23:05:01","modified_gmt":"2023-05-16T06:05:01","slug":"measure-the-effectiveness-of-your-microsoft-security-with-attackiq","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/01\/27\/measure-the-effectiveness-of-your-microsoft-security-with-attackiq\/","title":{"rendered":"Measure the effectiveness of your Microsoft security with AttackIQ"},"content":{"rendered":"\n
This blog post is part of the Microsoft Intelligent Security Association guest blog series<\/a>. Learn more about MISA<\/a>.<\/em><\/p>\n\n\n\n To improve an organization\u2019s cybersecurity readiness, you need to test that your detection and prevention technologies work as intended and that your security program is performing as best it can. Research from a Poneman Institute survey found that amongst over 500 information technology and security leaders across sectors, 53 percent said they were uncertain about the effectiveness and performance of their cybersecurity capabilities.1<\/sup> The reason? Even\u202fthe most advanced security controls fail\u202fdue to human error and configuration drift,\u202fand when they do, they fail silently. They need to be tested continuously to ensure performance.\u202fBy analogy, even\u202fthe best sports teams in the world need to exercise and prepare\u202ftheir defenses for attacks. If they don’t train, they atrophy. To ensure readiness, everyone needs to prepare for known threats.<\/p>\n\n\n\n The\u202fgood news is that the MITRE ATT&CK framework provides\u202fcyber defenders\u202fwith known tactics, techniques, and behaviors that adversaries use to conduct an attack.\u202fToday, Microsoft and\u202fAttackIQ are\u202fworking together, including through the\u202fMicrosoft Evaluation Lab<\/a>, to automate testing using MITRE ATT&CK and a threat-informed defense. AttackIQ is a part of the Microsoft Intelligent Security Association (MISA), an ecosystem of independent software vendors and managed security service providers that have integrated their solutions to better defend against a world of increasing threats.\u202fMISA helps break down silos between security organizations to build better-combined solutions and improve the world\u2019s cybersecurity posture.<\/p>\n\n\n\n AttackIQ enables Microsoft customers to test their use of Microsoft Defender for Endpoint<\/a>, Azure native cloud security controls<\/a>, and Microsoft Sentinel<\/a>, running adversary emulations against the security program to generate detailed data that the team can use. With granular performance data, the customer can make informed decisions about people, processes, and technology, and elevate the security program\u2019s overall performance.<\/p>\n\n\n\n Let\u2019s look at some of the ways the two companies work together.<\/p>\n\n\n\n To validate cybersecurity readiness,\u202fAttackIQ\u202fintegrates with Microsoft Defender for Endpoint<\/a> to emulate cyberattacks with realism and specificity. It does so at scale and continuously, testing Microsoft Defender for Endpoint\u2019s machine learning and AI-enabled technologies\u202fto generate granular data about security program performance.\u202f <\/p>\n\n\n\n In addition to testing Microsoft Defender for Endpoint,\u202fthe\u202fAttackIQ\u202f Security Optimization Platform\u202fruns assessments and scenarios against\u202fthe native cloud controls in\u202fMicrosoft Azure<\/a>, leveraging research\u202f<\/strong>from MITRE\u202fEngenuity\u2019s Center for Threat-Informed Defense<\/a> that maps the native security controls in Azure to MITRE ATT&CK.\u202fAttackIQ has built assessments to measure the effectiveness of native cloud controls.\u202fIn addition to Azure\u2019s native controls, AttackIQ is integrated with Microsoft Sentinel<\/a>, enabling Microsoft Sentinel users to test their detection pipeline and fine-tune security processes across their organization. <\/p>\n\n\n\n Security teams can schedule assessments to run against Microsoft Defender for Endpoint\u202fand Microsoft Azure\u202fas frequently as needed. Based on continuous testing, the\u202fAttackIQ Security Optimization Platform generates\u202fpoint-in-time and longitudinal\u202fdata about security control\u202fperformance, giving teams a sense of the program\u2019s overall readiness. <\/p>\n\n\n\n AttackIQ\u202fbrings a deep alignment with MITRE ATT&CK to its automated security control validation for Microsoft\u2019s security capabilities, leveraging a deep scenario library of tactics, techniques, and sub-techniques to validate security program performance.\u202f <\/p>\n\n\n\n Below is an image of an AttackIQ interface scenario that provides a basic function check of Microsoft Defender for Endpoint. Within the AttackIQ Security Optimization Platform, users can select this scenario out of a range of scenarios within the platform to validate the effectiveness of Microsoft Defender for Endpoint. From there, the user can assign the scenario to run against Microsoft Defender for Endpoint to validate its effectiveness through their infrastructure.<\/p>\n\n\n\nMeasuring\u202fsecurity\u202feffectiveness using MITRE ATT&CK\u00ae<\/h2>\n\n\n\n
Emulating the adversary to test Microsoft Defender for Endpoint<\/h3>\n\n\n\n
Testing Microsoft Azure and Microsoft Sentinel<\/h3>\n\n\n\n
Generating actionable performance data<\/h3>\n\n\n\n
Aligning MITRE ATT&CK with Microsoft<\/h3>\n\n\n\n
AttackIQ scenarios<\/h2>\n\n\n\n