Struggling to find cloud security expertise?

Our dashboards correlate events across the multi cloud and on-premise, Reduce resolution time time by 95% AccuKnox Dashboards turn hours into minutes

Start Risk Assessment

eBook

ebook

Get eBook worth $199 for Free

DOWNLOAD NOW
1/3

Blog

mssp

Why AccuKnox is the most MSSP Ready CNAPP?

LEARN MORE
2/3

Comparison

Comparison

Searching for Alternative CNAPP?

COMPARE NOW
3/3
mitre ttps min 1

Protecting Against Typical MITRE TTPs With KubeArmor

 |  December 16, 2021

What is MITRE TTPs MITRE TTP is a well-known comprehensive knowledge base that analyzes all the Tactics, Techniques, and Procedures (TTPs) that advanced threat actors could possibly use in their attacks. Rather than a compliance standard, it is a framework that serves as a foundation for threat models and methodologies. In any case, by using the […]

Reading Time: 2 minutes

What is MITRE TTPs

MITRE TTP is a well-known comprehensive knowledge base that analyzes all the Tactics, Techniques, and Procedures (TTPs) that advanced threat actors could possibly use in their attacks. Rather than a compliance standard, it is a framework that serves as a foundation for threat models and methodologies.

In any case, by using the MITRE ATT&CK framework model used to infiltrate and attack Kubernetes Clusters, An attacker
normally strategizes how to penetrate a cluster and perform damage by following the stages that require an attack lifecycle. The attacker must progress through each of these stages for the attack to be successful.

mitre min

How to Use the MITRE ATT&CK matrix for Kubernetes?

The MITRE Engenuity ATT&CK framework has 10 steps:

  1. Initial access
  2. Execution
  3. Persistence
  4. Privilege Escalation
  5. Defence Evasion
  6. Credential access
  7. Discovery
  8. Lateral Movement
  9. Collection and Exfiltration
  10. Command and Control

From initial access to command and control, these are the 10 tactics, which individually consist of techniques and sub-techniques.

Protect and Detect Typical TTPs in the MITRE ATT&CK framework with KubeArmor

Organizations currently have a vast amount of unsecured workloads and no efficient or unified way to protect them. Often, they are managing multiple, single-purpose security solutions to secure these workload stacks, which can create operational burdens and security gaps,

” Today’s new capabilities further our commitment to deliver comprehensive
cloud workload protection across hybrid and multi-cloud environments. DevOps
teams can now efficiently build and deploy their workloads and applications
rapidly while helping security teams deliver protection.

KubeArmor, is open-source software that enables you to protect your cloud workload at run-time.

 

Ready for a personalized security assessment?

“Choosing AccuKnox was driven by opensource KubeArmor’s novel use of eBPF and LSM technologies, delivering runtime security”

idt

Golan Ben-Oni

Chief Information Officer

“At Prudent, we advocate for a comprehensive end-to-end methodology in application and cloud security. AccuKnox excelled in all areas in our in depth evaluation.”

prudent

Manoj Kern

CIO

“Tible is committed to delivering comprehensive security, compliance, and governance for all of its stakeholders.”

tible

Merijn Boom

Managing Director

Please enable JavaScript in your browser to complete this form.