Splunk Enterprise Security

Splunk Enterprise Security

joomla
Engager

Hi Community Members,

Anyone knows whether we can use Splunk Enterprise Security to map our correlation searches against MITRE Tactics and Techniques without installing more apps like MITRE Dashboard or Splunk Security Essentials.

This mapping can help to see what security coverages we have and what requires improvements.

 

Many Thanks in advance.

0 Karma

aasabatini
Motivator

Hi @joomla 

one suggestion,  to use the mitre attck matrix without the security essentials and mitre dashboard is:

create a lookup table to map the mitre matrix, one column for the codes, another one for the names of the attack and other one for the description.

insert in your correlation rule a code field with the code in which the attack is mapped

example:

I created a correlation rule for the log4j vulnerability on my correlation search I will create this field

eval code= "CVE-2021-44228"

after this correlate the search with the lookup with the lookup command

---- your correlation search----
|lookup mitre.csv code
---end of your correlation search

hope can help

“The answer is out there, Neo, and it’s looking for you, and it will find you if you want it to.”
0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...