Skip to main content

Mitre map dashboard

  • October 25, 2024
  • 11 replies
  • 203 views

rahul7514
Forum|alt.badge.img+10

Hi 

Has anyone created a dashboard that highlights the mitre mapped tactics and techniques mapped use cases in the environment.? 

11 replies

matthewnichols
Community Manager
Forum|alt.badge.img+16
  • Community Manager
  • October 25, 2024

Hi @rahul7514 Thanks for your question. I've forwarded to product. Curious to hear what others have done. thanks


hzmndt
Staff
Forum|alt.badge.img+9
  • Staff
  • October 26, 2024

I think can put the MITRE info in the rule meta section like below, then create the dashboard based on the rule detection table 

 
mitre_attack_tactic = "Lateral Movement"
mitre_attack_technique = "Remote Services: SMB/Windows Admin Shares"
mitre_attack_version = "v13.1"

rahul7514
Forum|alt.badge.img+10
  • Author
  • Bronze 2
  • October 26, 2024

I think can put the MITRE info in the rule meta section like below, then create the dashboard based on the rule detection table 

 
mitre_attack_tactic = "Lateral Movement"
mitre_attack_technique = "Remote Services: SMB/Windows Admin Shares"
mitre_attack_version = "v13.1"

@hzmndt : yeah but what i was looking for is something that is visually appealing , which we do have in some other siem tools. We can call the meta section in dashboard but its appearance will be plain. 

Example :https://splunkbase.splunk.com/app/5742 or 

https://mitre-attack.github.io/attack-navigator/


AymanC
Forum|alt.badge.img+13
  • Bronze 5
  • October 26, 2024

Hi @rahul7514,

In terms of doing this in-platform, this is something I looked into the feasibility of doing, but unfortunately there is not a way within the dashboard capabilities to query all rules, and you could only build a visualisation heard on rules that have generated an alert, as mentioned by @hzmndt

Therefore, the alternative solution that has been implemented has been using a CI/CD pipeline (which we used anyway), and whenever there is a modification to a rule, to run a job which runs through every rule, extracts a portion within the rule’s meta section (Such as MITREID) and then builds a ready to import navigator. - this standardisation of rules is strengthened by an initial “test” stage within our pipeline to ensure it matches a seperate conformity checker script.

 

Unfortunately, this may not be the news you may be looking for - however would be interesting to see how other people have approached this.

Kind Regards,

Ayman


rahul7514
Forum|alt.badge.img+10
  • Author
  • Bronze 2
  • October 27, 2024

Hi @rahul7514,

In terms of doing this in-platform, this is something I looked into the feasibility of doing, but unfortunately there is not a way within the dashboard capabilities to query all rules, and you could only build a visualisation heard on rules that have generated an alert, as mentioned by @hzmndt

Therefore, the alternative solution that has been implemented has been using a CI/CD pipeline (which we used anyway), and whenever there is a modification to a rule, to run a job which runs through every rule, extracts a portion within the rule’s meta section (Such as MITREID) and then builds a ready to import navigator. - this standardisation of rules is strengthened by an initial “test” stage within our pipeline to ensure it matches a seperate conformity checker script.

 

Unfortunately, this may not be the news you may be looking for - however would be interesting to see how other people have approached this.

Kind Regards,

Ayman


@AymanC / @matthewnichols Oh okay so its not possible currently. Is there any roadmap in future version to have it integrated


matthewnichols
Community Manager
Forum|alt.badge.img+16
  • Community Manager
  • October 28, 2024

@rahul7514 @AymanC Check out David French's blog, Securing Your CI/CD Pipeline: Eliminate Long-Lived Credentials with Workload Identity Federation (3)

MITRE is discussed and he provides a script for it but I am not sure if it will solve what you're looking for. Yes, it sounds like MITRE is on the roadmap for next year. I don't have any exact dates. But will update you and Community when I hear more.


suzhuang
Staff
Forum|alt.badge.img+6
  • Staff
  • October 28, 2024

@AymanC / @matthewnichols Oh okay so its not possible currently. Is there any roadmap in future version to have it integrated


I think what you were looking for is the MITRE attack coverage map that helps you understand which attack techniques you're prepared for and whether you have gaps in your defenses or not. The product team is currently looking into ways to address this piece of challenge, so stay tuned! 🙂


Forum|alt.badge.img+1
  • New Member
  • January 27, 2025

Hello @suzhuang ,

Hope you are doing well!

Any progressive update on the MITRE Dashboard ?


suzhuang
Staff
Forum|alt.badge.img+6
  • Staff
  • February 20, 2025

Hello @suzhuang ,

Hope you are doing well!

Any progressive update on the MITRE Dashboard ?


No major update so far, we should have a better news in Q2!


smit8
Forum|alt.badge.img+6
  • Bronze 1
  • February 21, 2025

If I include mitre in my rule meta, can I surface that in a dashboard for now at least?


cmorris
Staff
Forum|alt.badge.img+10
  • Staff
  • February 21, 2025

If I include mitre in my rule meta, can I surface that in a dashboard for now at least?


Something like this may work, but only for rules that have fired, as we're looking at detection data. Rule meta section would need "mitre_tag".

$ruleName = detection.detection.rule_name $mitre = detection.detection.rule_labels["mitre_tag"] match: $ruleName outcome: $mitreTags = array_distinct($mitre) order: $ruleName asc

 Curated detections have tags as well, you can reference those with detection.tags. So query would be something like:

$ruleName = detection.detection.rule_name $mitre = detection.tags match: $ruleName outcome: $mitreTags = array_distinct($mitre) order: $ruleName asc

And resulting dashboard: