Before an Attack
MITRE has curated a number of resources to aid you in preparing.
The end-to-end workflow consists of several steps, the precise steps can be customized to your specific situation.
These actions align with the NIST Cybersecurity Framework stages of Identify, Protect, and Detect.
In addition, collaboration with industry groups and public-private partnerships will give you greater insight into risks and potential mitigations.
- Crown Jewels
- Device Pre-Certs
- Data Security
- Data Analysis
- Targeted Analytics
- Signature Dev’t
- Data Recovery