cyberzeshan/mitre-attack-grc-mapping

GitHub: cyberzeshan/mitre-attack-grc-mapping

将 MITRE ATT&CK 攻击技术系统性映射至 NIST 800-53、ISO 27001、CIS v8、SOC 2 等主流 GRC 框架,为威胁情报与合规治理搭建桥梁的参考知识库。

Stars: 0 | Forks: 0

# 🗺️ MITRE ATT&CK → GRC 控制措施映射
![MITRE ATT&CK](https://img.shields.io/badge/MITRE_ATT%26CK_v15-FF0000?style=flat-square&logoColor=white) ![NIST 800-53](https://img.shields.io/badge/NIST_SP_800--53_Rev5-003087?style=flat-square&logoColor=white) ![ISO 27001](https://img.shields.io/badge/ISO_27001%3A2022-0066CC?style=flat-square&logoColor=white) ![CIS Controls](https://img.shields.io/badge/CIS_Controls_v8-00A86B?style=flat-square&logoColor=white) ![SOC2](https://img.shields.io/badge/SOC_2_TSC-4A154B?style=flat-square&logoColor=white) ![License](https://img.shields.io/badge/License-MIT-green?style=flat-square) **将 MITRE ATT&CK Enterprise v15 技术全面映射至 NIST SP 800-53 Rev 5、ISO 27001:2022 Annex A、CIS Controls v8 和 SOC 2 TSC —— 包含检测指南、数据来源及 GRC 控制措施建议。**
## 📖 概述 **威胁情报**与**治理框架**之间的鸿沟正是安全计划失败的根源。GRC 从业人员熟知其控制措施;威胁情报团队则了解对手。本映射项目为两者搭建了桥梁。 对于每一项主要的 ATT&CK 技术,本仓库提供: - 涵盖该技术的**GRC 控制措施**(NIST、ISO、CIS、SOC 2) - 需要实施的**数据来源与检测方法** - ATT&CK 推荐的**缓解措施**(映射至实际的控制实施) - 基于普遍性和影响程度的各项技术的**风险评分指南** ## 📂 仓库结构 ``` mitre-attack-grc-mapping/ │ ├── mappings/ │ ├── initial-access-mapping.md # TA0001 — Phishing, supply chain, external services │ ├── persistence-mapping.md # TA0003 — Scheduled tasks, registry, boot persistence │ ├── privilege-escalation-mapping.md # TA0004 — Token manipulation, abuse elevation │ ├── defense-evasion-mapping.md # TA0005 — Log clearing, masquerading, obfuscation │ ├── credential-access-mapping.md # TA0006 — Credential dumping, brute force, keylogging │ ├── lateral-movement-mapping.md # TA0008 — Pass the hash, RDP, internal spearphishing │ ├── exfiltration-mapping.md # TA0010 — Exfil over C2, web service, physical medium │ └── impact-mapping.md # TA0040 — Ransomware, data destruction, defacement │ ├── by-framework/ │ ├── nist-800-53-to-attck.md # NIST control → ATT&CK techniques it mitigates │ ├── iso27001-annex-a-to-attck.md # ISO Annex A control → ATT&CK coverage │ ├── cis-v8-to-attck.md # CIS Control → ATT&CK coverage gaps │ └── soc2-tsc-to-attck.md # SOC 2 TSC → ATT&CK technique coverage │ ├── risk-scoring/ │ ├── technique-risk-ratings.md # Prevalence + impact scoring for top techniques │ └── control-gap-analysis.md # Where your controls leave ATT&CK coverage gaps │ └── use-cases/ ├── purple-team-grc-alignment.md # How to use this for purple team exercises ├── soc-detection-coverage.md # Mapping SOC detections to GRC controls └── ransomware-defense-mapping.md # Full ransomware kill-chain → control mapping ``` ## 🗺️ 主映射表 — 重点 ATT&CK 技术(按普遍性排序) | ATT&CK ID | 技术 | 战术 | 普遍性 | NIST SP 800-53 控制 | ISO 27001 Annex A | CIS Controls v8 | SOC 2 TSC | 检测来源 | |:---|:---|:---|:---:|:---|:---|:---|:---|:---| | T1566.001 | 钓鱼:鱼叉式钓鱼附件 | Initial Access | 🔴 严重 | SI-8, AT-2, SC-7 | A.6.3, A.8.23 | CIS 9, 14 | CC6.1, CC2.2 | 电子邮件网关日志,沙箱引爆 | | T1078 | 有效账户 | Initial Access / Persistence | 🔴 严重 | AC-2, AC-3, IA-5 | A.5.15–5.18 | CIS 5, 6 | CC6.1, CC6.2 | 身份验证日志,UEBA | | T1059.001 | 命令与脚本:PowerShell | Execution | 🔴 严重 | CM-7, SI-3, AU-12 | A.8.19, A.8.15 | CIS 4, 8 | CC7.2 | PowerShell 日志 (4103/4104),EDR | | T1055 | 进程注入 | Defense Evasion / Privilege Escalation | 🟠 高 | SI-3, CM-7, SC-39 | A.8.8, A.8.19 | CIS 10, 13 | CC7.2 | EDR 进程遥测,内存分析 | | T1003.001 | 操作系统凭证转储:LSASS 内存 | Credential Access | 🔴 严重 | IA-5, SC-28, AC-6 | A.5.17, A.8.5 | CIS 5.4, 13 | CC6.1 | EDR,Windows 事件 4656/4663 | | T1021.001 | 远程桌面协议 | Lateral Movement | 🟠 高 | AC-17, SC-7, CM-7 | A.6.7, A.8.20 | CIS 4.5, 12 | CC6.6 | 网络流量,RDP 身份验证日志 | | T1486 | 数据加密以造成影响(勒索软件) | Impact | 🔴 严重 | CP-9, SC-28, IR-4 | A.5.29, A.8.13 | CIS 11, 17 | CC7.5, A1.2 | 文件系统监控,EDR,备份完整性 | | T1190 | 利用面向公众的应用 | Initial Access | 🟠 高 | RA-5, SI-2, CM-7 | A.8.8, A.8.25 | CIS 7 | CC7.1 | WAF 日志,漏洞扫描器,IDS | | T1110 | 暴力破解 | Credential Access | 🟡 中 | AC-7, IA-5, AU-6 | A.5.17, A.8.5 | CIS 5.2, 6 | CC6.1 | 身份验证失败日志,SIEM 告警 | | T1071.001 | 应用层协议:Web 协议 (C2) | Command and Control | 🟠 高 | SC-7, SC-44, SI-4 | A.8.20, A.8.22 | CIS 12, 13 | CC7.2 | 代理日志,DNS 日志,NTA/NDR | | T1027 | 混淆文件或信息 | Defense Evasion | 🟡 中 | SI-3, CM-7, AU-12 | A.8.19, A.8.15 | CIS 10 | CC7.2 | EDR,脚本块日志记录 | | T1053.005 | 计划任务/作业 | Persistence | 🟡 中 | CM-7, AU-12, SI-7 | A.8.19, A.8.15 | CIS 4, 8 | CC6.1, CC7.2 | Windows 事件 4698/4702,EDR | | T1136 | 创建账户 | Persistence | 🟡 中 | AC-2, AU-9, IA-2 | A.5.16, A.5.18 | CIS 5, 6 | CC6.2 | 目录变更日志,SIEM | | T1562.001 | 削弱防御:禁用安全工具 | Defense Evasion | 🟠 高 | AU-9, CM-7, SI-3 | A.8.19, A.8.15 | CIS 10 | CC7.2 | 安全工具健康监控,EDR | | T1041 | 通过 C2 通道渗漏数据 | Exfiltration | 🟠 高 | SC-7, SC-44, DM 策略 | A.5.14, A.8.20 | CIS 12, 13 | CC6.7, CC7.2 | NDR,DLP,代理/防火墙日志 | **普遍性评级:** 🔴 严重(在 >50% 的事件中出现)  |  🟠 高 (>25%)  |  🟡 中 (>10%)  |  🔵 低 ## 🛡️ 勒索软件杀伤链 — 完整控制映射 ``` RANSOMWARE ATTACK CHAIN GRC CONTROLS THAT BREAK EACH STAGE ═══════════════════════════════════════════════════════════════════════════════ STAGE 1: INITIAL ACCESS T1566 — Phishing Email → Email filtering (CIS 9), Security Awareness (CIS 14) T1190 — Exploit Public App → Vulnerability Management (CIS 7), WAF (SC-7) T1078 — Stolen Credentials → MFA (CIS 5.3), PAM (CIS 5.4), UEBA STAGE 2: EXECUTION & PERSISTENCE T1059 — Script Execution → PowerShell constrained mode, script block logging T1053 — Scheduled Tasks → Endpoint hardening (CIS 4), EDR detection T1547 — Boot/Logon Autostart → Application allowlisting (CIS 2.7) STAGE 3: PRIVILEGE ESCALATION T1055 — Process Injection → EDR with behavioral detection, least privilege T1068 — Exploit Privilege Escalation → Patch management SLA (CIS 7.4) T1003 — Credential Dumping → LSASS protection, Credential Guard, PAM STAGE 4: LATERAL MOVEMENT T1021 — Remote Services → Network segmentation (CIS 12), RDP restriction T1550 — Pass the Hash → Disable NTLM, implement Kerberos, tier model T1563 — RDP Session Hijacking → Just-in-time access, privileged workstations STAGE 5: DATA STAGING & EXFILTRATION T1041 — Exfil over C2 → DLP (CIS 3.14), Proxy inspection, NDR T1048 — Exfil Alternative Protocol → Egress filtering, DNS monitoring T1567 — Exfil to Cloud → CASB, cloud app control, data classification STAGE 6: IMPACT — ENCRYPTION T1486 — Data Encrypted for Impact → Immutable backups (CIS 11), tested recovery File integrity monitoring, rapid IR plan ═══════════════════════════════════════════════════════════════════════════════ DEFENSE SUMMARY: Controls with highest kill-chain coverage: 1. MFA + PAM → Blocks Stages 1, 3, 4 2. EDR with behavioral rules → Blocks Stages 2, 3, 4, 6 3. Network Segmentation → Degrades Stages 4, 5 4. Immutable Backups → Defeats Stage 6 (eliminates leverage) 5. Patch Management SLA → Reduces Stage 1, 3 attack surface ``` ## 📊 控制覆盖热力图 — 前 5 大 GRC 框架 | ATT&CK 战术 | NIST 800-53 | ISO 27001 | CIS v8 | SOC 2 TSC | 覆盖缺口 | |:---|:---:|:---:|:---:|:---:|:---| | Initial Access | ●●●●○ | ●●●○○ | ●●●●○ | ●●○○○ | SOC 2 缺乏技术控制 | | Execution | ●●●●● | ●●●○○ | ●●●●○ | ●●●○○ | ISO 27001 仅停留在高层 | | Persistence | ●●●●○ | ●●●○○ | ●●●●● | ●●○○○ | SOC 2 检测覆盖较弱 | | Privilege Escalation | ●●●●○ | ●●●○○ | ●●●●● | ●●●○○ | ISO 27001 缺乏技术深度 | | Defense Evasion | ●●●○○ | ●●○○○ | ●●●●○ | ●●○○○ | 所有框架在此均存在缺口 | | Credential Access | ●●●●● | ●●●○○ | ●●●●● | ●●●●○ | ISO 27001 规定性较弱 | | Lateral Movement | ●●●●○ | ●●●○○ | ●●●●○ | ●●●○○ | 需侧重于网络隔离 | | Exfiltration | ●●●○○ | ●●●○○ | ●●●●○ | ●●●○○ | DLP 覆盖不一致 | | Impact | ●●●●● | ●●●●○ | ●●●●● | ●●●●○ | 所有框架均具有强大覆盖 | **图例:** ● = 覆盖强度(1-5 级) ## 📚 参考文献 - [MITRE ATT&CK Enterprise v15](https://attack.mitre.org/) - [NIST SP 800-53 Rev 5](https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final) - [NIST SP 800-53B 控制基线](https://csrc.nist.gov/publications/detail/sp/800-53b/final) - [威胁知情防御中心 — ATT&CK 至 800-53 映射](https://ctid.mitre-engenuity.org/) - [CIS Controls v8](https://www.cisecurity.org/controls/v8) ## 📄 许可证 MIT License — 可免费使用、改编和分发,但需注明出处。
Zeshan Ahmad 构建 · GRC 工程师与网络安全领域专家 (SME)
标签:CIS Controls, Cloudflare, GRC, ISO 27001, IT治理, MITRE ATT&CK, NIST 800-53, SOC 2, 企业安全, 初始访问, 协议分析, 合规自动化, 威胁情报, 安全合规, 安全基线, 安全框架映射, 开发者工具, 控制措施, 教学环境, 数据源, 权限提升, 私有化部署, 缓解措施, 网络代理, 网络安全, 网络资产管理, 防御加固, 防御规避, 隐私保护, 风险评分