Classifying attacks according to the MITRE repository

SES Evolution allows you to reference attackers' techniques and sub-techniques in your logs, as listed and described in the MITRE Att&ck matrices and in the common vulnerabilities and exposures (CVEs) published by the American organization MITRE. Thus, in the event of an attack, IT administrators can quickly identify it and take appropriate action.

This feature associates a security rule with an attack intent and tags.

This allows you to specify for each rule the type of attack that might be underway when the rule is applied. You can also specify a list of tags to automatically associate your SES Evolution rules with the MITRE repository.

The purpose of this feature is to rapidly provide administrators with information via the logs sent to the console when security rules are applied. They can then identify the possible attack underway on the pool by viewing its classification, and go directly to the URL of the MITRE technique or CVE. Tags can also reference vulnerabilities identified by Stormshield on its https://advisories.stormshield.eu/ website.

EXAMPLE