The Defenders Advantage Version Two Ebook
The Defenders Advantage Version Two Ebook
Defender’s
Advantage
A guide to activating cyber defense
Defender’s
Advantage
A guide to activating cyber defense
Table of Contents
Foreword 6
Introduction 9
Collection 23
Analysis 23
Production 25
Dissemination 27
Feedback 28
Vulnerability prioritization 30
Brand Intelligence 32
2
The Defender’s Advantage Table of Contents
Detection engineering 43
Aligning detections to attacker tactics, techniques, and procedures 44
Pursuit of fidelity 46
Detection optimization 47
Automation strategy 48
Personnel strategy 52
Responding to compromise 55
Initial triage 55
Playbook review 60
Investigation lifecycle 62
Incident remediation 65
Containment 68
Eradication 70
Security enhancement 72
Investigation accelerators 74
3
The Defender’s Advantage Table of Contents
Intelligence-led validation 87
4
The Defender’s Advantage Table of Contents
Conclusion 149
5
The Defender’s Advantage Foreword
Foreword
For organizations, a security breach can be devastating and costly. The impact
can be everything from data and intellectual property theft to financial losses
to reputational harm—and often a mix of several. Further, attacks on critical
infrastructure, financial institutions, and government organizations, as well as
cyber-physical warfare seen in global conflicts, can threaten our way of life.
6
The Defender’s Advantage Foreword
On top of all this, organizations must feel confident in their cyber defenses and
readiness if they want to effectively protect data, employees, and even our way
of life. Part of this confidence comes when organizations fully understand their
own environments, where they will be meeting adversaries. We have control
over these environments, and this is what gives us the Defender’s Advantage.
Organizations have it, and now is the time to capitalize on it.
Jurgen Kutscher
VP, Mandiant Consulting at Google Cloud
7
The Defender’s Advantage 00
8
The Defender’s Advantage Introduction
Introduction
Properly coordinated cyber defense programs can deter the most advanced
cyber attackers and the principles of The Defender’s Advantage will explain how.
9
The Defender’s Advantage Introduction
The threats will change all the time. Don’t ever forget
the advantage that you do have. You should know more
about your business, your systems, your topology, your
infrastructure than any attacker does. This is an incredible
advantage.
Kevin Mandia
Founder, Mandiant
Organizations can utilize expert in-house and outside resources to design and
operate a robust cyber defense program. They can work to operationalize
intelligence, develop, deploy, and maintain detection capabilities while working
to apply proper automation, and establish mature response procedures.
To maximize and maintain their upper hand, organizations can also leverage
managed services to provide cyber defense coverage specific to their needs.
These capabilities maximize the Defender’s Advantage.
10
The Defender’s Advantage Introduction
11
The Defender’s Advantage 00
12
The Defender’s Advantage What is Cyber Defense?
Cyber Defense is the act of actively resisting attacks and minimizing the
impact of a compromise. It is one of the four domains of Information Security
with the other domains being Security Governance, Security Architecture,
and Security Risk Management. A robust Cyber Defense program integrates
with the other information security domains to create a hardened and resilient
security posture for an organization.
Security
Governance
Security Risk
Management
Security Cyber
Architecture Defense
13
The Defender’s Advantage What is Cyber Defense?
The Cyber Defense domain is made up of six critical functions to achieve the
mission of identifying and responding to threats to an organization. The
mission of a Cyber Defense organization is to allow an organization to
continue to operate in the face of threats. The functions of the Cyber Defense
domain are Intelligence, Detect, Respond, Validate, Hunt, and Mission Control.
These functions work together to provide a common front against attackers.
Alex Wood
CISO, Uplight
14
The Defender’s Advantage What is Cyber Defense?
Intelligence
Validate
Hunt Detect
Mission
Control
Respond
15
The Defender’s Advantage What is Cyber Defense?
The Hunt function expands the detection capabilities of the Cyber Defense
program by becoming proactive as it examines the environment for active
compromises. It helps to ensure defense controls are operating as designed
and provides defenders with the opportunity to identify weaknesses in
their controls or undesired activity. Hunt activities provide a very practical
complement to the Validate function.
16
The Defender’s Advantage What is Cyber Defense?
The Mission Control function provides the connective tissue that holds
the other Cyber Defense functions together and drives coordination and
unified management across the program. It also ensures that the functions
are connected to the organization’s business goals and values. This function
is focused on Cyber Defense program management and establishes formal
processes for resources management, communications, metrics, and crisis
management. Additionally, Mission Control ensures coordination with non-
cybersecurity teams across an organization. This program management
ensures that the Cyber Defense capabilities remain resilient and aligned to
changes within an organization and threat landscape.
17
The Defender’s Advantage 00
18
The Defender’s Advantage Intelligence
Intelligence provides a
guiding light
19
The Defender’s Advantage Intelligence
20
The Defender’s Advantage Intelligence
Intelligence
Lifecycle
Production Collection
Develop intelligence Collect data aligned to
products; written, verbally, and intelligence requirerments
through automated feeds
Analysis
Process and enrich collected data into a
context that can support decision making
This is critical for impactful Intelligence, as it will guide the remaining steps
of the intelligence lifecycle, determining what intelligence matters to an
organization, how it’s collected, produced, and disseminated. The Intelligence
function should build relationships with key individuals in each cyber defense
function to ensure consistent, effective, and efficient communication. Example
stakeholders include: SOC analysts, red teams, incident response teams,
forensic investigators, hunt teams, senior decision makers, upper management,
and executives.
21
The Defender’s Advantage Intelligence
For example, the Detect and Validate functions require information on new
and emerging IOCs and TTPs aligned to key threats to an organization. To fulfill
this need, the Intelligence function may document intelligence requirements
that include identifying and maintaining a list of threats to an organization
aligned to threat actors, malware families, campaigns, vulnerabilities, etc., and
a requirement to collect both tactical and operational intelligence aligned to
those threats.
22
The Defender’s Advantage Intelligence
Collection
Intelligence requires data collection and information gathering for analysis to
be conducted. The collection of key data sources needs to be documented
and aligned to established intelligence requirements. Aligning collection
with intelligence requirements allows organizations to ensure they have
the data and information available to fulfill intelligence requirements and to
document and potentially fill any gaps in data sources. Organizations should
also make a determination on the reliability and credibility of each collection
source, which includes visibility, fidelity, relevance, and timeliness. It is critical
for organizations to focus on the quality of data versus the quantity. Many
security organizations subscribe to multiple intelligence feeds, but struggle to
operationalize the intelligence in a way that protects an organization.
Analysis
Data that has been collected does not become intelligence until it has been
analyzed, distilled, and made relevant to an organization. Analysis involves
enriching and combining collected data points into a context that can support
tactical, operational, and strategic decisions. For example, an IP address is a
data point that will not provide any actionable value when presented on its
own. It is not until an analyst has enriched and contextualized an IP address with
relevant data that threat intel begins to form. Contextualizing and analyzing
data around an IP may include identifying that a threat actor leveraged the
IP address in a credential harvesting campaign, at a certain time period, and
leveraged specific tools. This analysis provides actionability for the Detect
23
The Defender’s Advantage Intelligence
Shanyn Ronis
Head of Cyber Threat Coordination Center, Google Cloud
Methods of analysis can vary from analyst to analyst, team to team, and
organization to organization depending on the tools and expertise available.
Intelligence functions should seek to incorporate best practices and structured
analytic techniques as much as possible to ensure the highest fidelity and
reliability of assessments. Popular frameworks, such as MITRE ATT&CK®, can
streamline analysis processes and provide common terms for communicating
intelligence across an organization.
24
The Defender’s Advantage Intelligence
Production
Communication plays a big role in the Intelligence function. It is important for
threat intelligence teams to meet stakeholders where they are in their intelligence
journey, while making efforts to uplift an organization’s overall understanding of
how to use cyber threat intelligence to enable business decisions. To accomplish
this, Intelligence functions should establish a service catalog, which defines,
correlates, and documents stakeholders, intelligence requirements, and
production needs to analytic methodologies. The function should also develop
intelligence report templates and outputs aligned to the service catalog.
25
The Defender’s Advantage Intelligence
There are three types of intelligence that define production and are
determined by audience:
2
Operational intelligence provides an understanding of how
a threat operates to assist incident responders, forensic
investigators, and threat hunters to identify, contain, and
remediate intrusions. This type of intelligence focuses on
identifying threat actors’ motivations, associated TTPs, and
changes to infrastructure to help answer the questions of
“how” and “where”.
3
Tactical intelligence provides atomic and contextualized
indicators associated with known malicious or suspicious
activity along with associated threat context to help
organizations develop detections, assist SOC analysts with
alert triage, and identify threats within an environment. This
type of intelligence focuses IOC management associated
with threats and helps to answer the questions of “what”.
26
The Defender’s Advantage Intelligence
A key piece of intelligence production is asking: “So what?” The “So what?”
should address why the report is relevant to the audience, and why the reader
should care. It should be the key takeaway for the reader, clearly communi-
cating how the identified activity can or does affect an organization, and what
is likely to happen next. It should also make follow-on actions apparent for
the target audience and clearly outline the implications of the activity. The
“So what?” does not, however, identify actions taken or to be taken by the
target audience. An intelligence report may provide recommendations to help
improve an organization’s cyber defenses against a specific threat, but it is
up to the stakeholder(s) to determine if, how, and when the actions should be
taken and execute those actions—also known as operationalizing intelligence.
Dissemination
Due to the different needs of various stakeholders, the Intelligence function
must tailor dissemination to each audience and stakeholder. Language, format,
and delivery methods, such as frequency, intent, and expected actions, may
vary between the different audiences and stakeholders. For example, if the
Intelligence function is asked to provide a briefing to an executive team on
potential cyber threats to an organization, this would typically not include IOCs,
malware analysis, or other technical information. The briefing would include
narratives that indicate trends, key activity of interest, and how that activity
could adversely impact an organization, as well as controls and mitigations
27
The Defender’s Advantage Intelligence
that could be put in place to defend against this type of activity. Conversely, if
the Intelligence function were asked to provide a briefing to an organization’s
incident response team on a new method leveraged by a threat actor, the
briefing would focus more on the technical aspects, initial infection vectors,
attack lifecycle, and persistence mechanisms to assist in investigations.
Feedback
Feedback is a critical phase of the intelligence lifecycle and often overlooked.
In worst case scenarios, a lack of feedback results in an Intelligence function
operating in a silo and not communicating effectively with stakeholders.
Without clear, regular, and effective feedback that is actioned by the Intelligence
function, intelligence products can miss the mark and their intended consumers
“tune out” the intelligence. The delicate trust relationship between the Intelli-
gence function and its stakeholders would be lost, resulting in minimally effective
intelligence, limiting the overall effectiveness of the cyber defense organization.
28
The Defender’s Advantage Intelligence
29
The Defender’s Advantage Intelligence
Vulnerability prioritization
The Intelligence function provides valuable context around vulnerabilities
relevant to an organization. Intelligence on existing proof of concepts or
successful exploitation of a vulnerability can enhance risk assessments for
vulnerability management teams, allowing teams to better prioritize vulner-
abilities for mitigation and patching. Additionally, intelligence can strengthen
business justifications for mitigation and patching by incorporating threat
intelligence into risk assessments.
30
The Defender’s Advantage Intelligence
Gibby McCaleb,
Director of Security Operations
31
The Defender’s Advantage Intelligence
Brand Intelligence
Social media and dark web monitoring falls under the purview of the Intelligence
function. Intelligence functions monitor these sources for information on the
latest cyber threats and any mention of an organization or its vendors. This can
aid in threat mitigation efforts along with assessing possible physical threats to
an organization. While social media and dark web chatter is not always the most
reliable source of information, this service can help organizations unlock new
brand intelligence data sources.
32
The Defender’s Advantage Intelligence
Andrew Close
Manager Intelligence Consulting and Training Solutions,
Google Threat Intelligence
33
The Defender’s Advantage Intelligence
• Associated TTPs aligned to the threat actors, mapped to the MITRE ATT&CK
Framework where possible
34
The Defender’s Advantage Intelligence
Mark Owens
Head of Intelligence Training, Google Threat Intelligence
35
The Defender’s Advantage Intelligence
the intelligence identified in the first two sections of the threat profile and
connecting it to the organization’s specific risk and impact analysis will allow
organizations to also identify proactive mitigation strategies to better defend
themselves against cyber threats.
Threat Landscape
Who is targeting you?
36
The Defender’s Advantage Intelligence
Emily Cranston
Manager of Global Cyber Defense, Mandiant Consulting at Google Cloud
37
The Defender’s Advantage Intelligence
38
The Defender’s Advantage Intelligence
39
The Defender’s Advantage 00
40
The Defender’s Advantage Detect
41
The Defender’s Advantage Detect
Intel indentifies
attack behavior
Detect produces
Response provides actionable alerts Respond solves
incident report in SIEM and other triggered alerts
Hunt generates baseline Security Tools
Mission Control
highlights
operational metrics
Feedback
42
The Defender’s Advantage Detect
Daniel Nutting
Manager for Cyber Defense Operations Consulting,
Mandiant at Google Cloud
Detection engineering
Detection engineering is a systematic discipline built upon analysis and adap-
tation. At its core lies a continuous loop: understanding threats, generating
detections, tuning responses, and refining the cycle. Intelligence on adversary
behaviors inform and shape detections that keep organizations secure. This
iterative process mirrors the way adversaries constantly evolve, ensuring
defenders are always adapting and never caught off guard.
Adversaries aren’t bound by rigid rules. They study their targets, identifying
weaknesses within an organization’s environment, people, and processes. From
this reconnaissance, they strategically choose TTPs to best exploit those vulner-
abilities and achieve their objectives. Each step an attacker takes where they
leave a trace, subtle or overt, is an opportunity for detection engineers to uncover
and create detections to alert on. No matter how novel, impressive, or complex
a detection is written, if it does not address the relevant TTPs, it is useless.
43
The Defender’s Advantage Detect
David Lindquist
Senior Manager, Managed Defense Security Operations Center,
Mandiant at Google Cloud
44
The Defender’s Advantage Detect
Attackers constantly adapt their TTPs to evade detection and overcome new
security measures implemented by defenders. They analyze the effectiveness
of their past attacks, learning from both their successes and failures. This
continuous learning process allows them to refine their TTPs, making them
more sophisticated and harder to detect. As a result, defenders are often in a
reactive position, playing catch-up with the latest attacker techniques.
For instance, if a prevalent TTP involves deploying web shells for persistent
access, defenders should prioritize collecting web server logs, including access
logs, error logs, and application-specific logs. These logs can reveal suspicious
file uploads, unexpected script executions, and abnormal traffic patterns that
might indicate the presence of a web shell. Similarly, if a common TTP involves
using web shells to execute commands and manipulate files on compromised
servers, defenders should concentrate on gathering file integrity monitoring
(FIM) logs, process execution logs, and system event logs. These logs can help
identify unauthorized file modifications, suspicious processes, and unexpected
system events that could point to malicious activity originating from a web shell.
45
The Defender’s Advantage Detect
By aligning log collection with the observed TTPs, defenders can create a more
effective and efficient security monitoring strategy. This approach allows them
to proactively identify and investigate potential threats, reducing the risk of
successful attacks and minimizing the impact of any breaches that do occur.
It also helps to ensure that the SIEM is a valuable tool for security analysts,
providing them with the relevant information they need to detect and respond
to threats in a timely manner.
Pursuit of fidelity
The process of detection creation isn’t haphazard. A mature methodology
follows a defined lifecycle—from initial research and development, to testing
and validation, to production deployment and ongoing maintenance. By
adhering to this structure, detection engineers ensure that their work is of the
highest quality, reducing noise for analysts and offering true defensive value.
A detection is only as good as its validation. Not every alert is a true attack. False
positives plague analysts so detection engineers must subject their creations
to rigorous testing. This process involves simulating adversary behaviors and
verifying that the alert fires as intended. Once in production, alerts undergo
thorough triage, separating benign activity from real threats. This stage is often
a collaborative effort involving security analysts and incident responders.
46
The Defender’s Advantage Detect
Detection optimization
Detection engineering rarely occurs in a vacuum. Detections often rely upon
dependencies like system configurations, tools, and intelligence feeds. A
robust dependency management process becomes non-negotiable. Changes
in underlying systems can quietly break detections, and outdated threat data
leads to coverage gaps. Engineers must track these dependencies meticulously,
ensuring any modifications upstream are reflected in their downstream
detection logic.
Commonly, organizations write alerts for specific, high risk servers or appli-
cations, with the asset name explicitly written into the alert logic. Years later, the
server owner changes the name of the server, because the OS was upgraded
or it was moved to a different datacenter, an innocuous reason. However, they
neglect to inform the security team of the change. Since so often no news is
good news in security, a lack of alerts may not be obvious. Regular testing is
necessary to ensure that the entire log to alert pipeline is still functioning.
Similar issues arise when log formats or schemas change. An alert may be
written when a firewall logs a “block” action. If a vendor upgrade shifts the
logging schema, and now the firewalls log “drop” actions instead, the alert is
now blind. As such, data normalization is a detection engineer’s best friend.
47
The Defender’s Advantage Detect
Automation strategy
Automation allows them to scale beyond the constraints of manual processes,
reduce alert fatigue, and accelerate response times. It can also mitigate the risk of
procedural and human error in the investigation and evidence gathering process.
48
The Defender’s Advantage Detect
Automated defense technologies scope all related systems and activity for
the duration of an attack. The incident may span a few seconds or many days;
sometimes even years. The technology prioritizes the incident investigation,
factoring in the scope, asset criticality, attack stage, and confidence in the
escalation. The prioritized incident is then presented to the analyst with
supporting evidence including:
• An event timeline (a series of events from various security tools over time)
• Enabling SOAR: Detection is just the first step, followed by the whirlwind
of triage, enrichment, and containment action. Integrating detection logic
with SOAR platforms unlocks the true potential of automation. Detections
that are built alongside SOAR playbooks streamline the analyst workflow and
enable decisive, automated responses to emerging threats.
49
The Defender’s Advantage Detect
Not all automation is created equal. Prioritization is key for maximum impact.
Detection engineers must be in constant dialogue with analysts and incident
responders—where are the pain points? Where is time wasted on mundane,
repetitive tasks? High-fidelity detections that trigger excessive false positives
are ripe for automated triage. These insights, coupled with an understanding of
the adversary’s most likely TTPs and an organization’s crown jewels, inform the
automation roadmap.
50
The Defender’s Advantage Detect
The lure of the latest and greatest security tool is strong, but unmanaged
adoption can lead to a sprawling ecosystem of underutilized systems. This sprawl
increases cost, introduces complexity, and hinders detection engineering
efficiency. A governance process must be in place to vet new tools, ensuring
they align with clear objectives, address existing gaps, and create a plan for
long-term management and support.
Logging agents often collect overlapping data. It’s essential to be aware of this
redundancy. Duplicated logs increase storage costs and can introduce noise
when detections fire against both sources. Understanding exactly which tool
provides the most accurate, timely, and enriched data for a given use case
allows detection engineers to streamline and optimize their detection logic.
Identifying high-priority sources—authentication logs, system events, sensitive
data access—is key for focusing engineering efforts. A risk-based approach, in
collaboration with business units, drives this prioritization.
Mary Writz
SVP Products
51
The Defender’s Advantage Detect
The sheer volume of logs and alerts can overwhelm analysts and detections.
Noise reduction becomes paramount. This includes filtering out routine events,
aggregating logs where possible, and tuning out unnecessary data fields. Log
retention practices must also be established, striking a balance between investi-
gative needs and storage costs. All these steps, informed by threat intelligence,
refine the data gathered to make finding actual threats far more feasible.
Personnel strategy
The recruitment or engagement of individuals for cyber defense detection
frequently necessitates unconventional thinking, given the abundance of entry-
level candidates and security providers relative to seasoned and highly skilled
professionals. Establishing roles and responsibilities for cyber defense
detection requires an examination of existing resources and the desired out-
comes to be achieved through contractual arrangements. In most instances, it
is feasible to hire, contract, and employ a Managed Security Service Provider
(MSSP) to fill roles and responsibilities requiring specific expertise.
Critical detection roles constitute the initial point of contact for an incident.
Ensuring adequate training and experience for individuals in these roles is
essential. A notable challenge within the industry pertains to analyst errors
leading to the closure of genuine incidents due to misinterpretations of
associated events under review. Consequently, ongoing training efforts are
necessary for the role and the solutions employed to maintain a robust state
of vigilance for incident investigation. A comprehensive training plan should
be developed, encompassing the expertise of diverse cybersecurity industry
training, and incorporating the solutions utilized by the team.
52
The Defender’s Advantage Detect
Two critical roles that should be involved in testing and root cause analysis
are event analysis and detection engineering. In many instances, these roles
may be performed by the same team members or service. Striking a balance
between the performance of both roles is essential to align team priorities
when responsibilities are shared. Additionally, as capabilities evolve, it may be
beneficial to introduce dedicated content development experts over time.
53
The Defender’s Advantage 00
54
The Defender’s Advantage Respond
Responding to compromise
Initial triage
Response begins when evidence of potential unauthorized activity is escalated
for further investigation. This initiates the triage phase which guides future
phases of the investigation based on the following.
55
The Defender’s Advantage Respond
The triage phase goes beyond surface-level evaluation. Analysts must dig deeper,
understand the context of an alert, and gather additional evidence. This can be
assisted or amplified by the collection of data or artifacts through automated
activities or by the correlation and analysis of previous observed behavior. If
a breach is revealed then the incident transitions from suspicion to confirmed
incident that warrants a full-scale investigation.
Consider the example of a security team setting up alerts for the use of the
“whoami” command within your environment. This command is a favorite
among attackers and legitimate users alike, complicating its interpretation.
If the intent of an alert is to flag any usage of “whoami” for review, then even
legitimate use is a true positive, and the alert should fire in all cases. However,
if the aim is solely to spot malicious use, legitimate use flagged as an alert is a
false positive.
56
The Defender’s Advantage Respond
57
The Defender’s Advantage Respond
Engaging with the user to extract as much detail as possible provides invaluable
context, whether related to activity timelines or additional investigation “self-
help” steps. This dialogue not only aids in identifying the presence of malicious
tools or malware, but also in gauging the user’s awareness of such anomalies.
Further depth is added to the analysis through inputs from system admin-
istrators or from monitoring tools. These sources enrich the understanding of
the incident by offering details such as hostnames, IP addresses, operating
systems, programs, and user roles.
58
The Defender’s Advantage Respond
If the analyst concludes that immediate resolution isn’t feasible, the collected
evidence and findings are then transitioned to the investigation lifecycle phase.
Here, a deeper dive into the incident continues, aimed at uncovering more
details and determining a comprehensive response strategy.
At this critical junction, the analyst coordinates with the Mission Control
function to engage additional stakeholders necessary for the decision making
process. For widespread incidents or those that involve sensitive or time-critical
operational processes, incident response efforts are likely to require an organi-
zational-level response that involves areas outside of the response process.
This includes determining the need for activating cyber insurance or consulting
legal counsel. Such decisions are pivotal, particularly for organizations under
stringent regulatory requirements regarding data breaches. Regulations often
dictate specific protocols for reporting incidents like data theft or ransomware
infections, with a clear timeline for notifications once an incident is identified.
Engaging legal counsel early ensures that an organization understands its
notification obligations and prioritized actions to comply with legal and
regulatory standards.
59
The Defender’s Advantage Respond
Playbook review
The responsibility of keeping incident response playbooks current falls to
the analyst spearheading the triage process. Given the dynamic nature of
cybersecurity threats, any automated or manual playbook requires regular
review and updates. Using an outdated playbook can severely hamper incident
response efforts, as it may refer to processes, people, and or infrastructure
that are no longer applicable or relevant.
An actively used and periodically updated playbook signifies its value and utility
to the Cyber Defense team. Conversely, a playbook that becomes obsolete is
no longer a dependable asset for analysts to use. To avoid this, analysts need a
process and the authority to promptly amend playbooks whenever they spot
any inaccuracies or changes in the operational environment or even in the
threat landscape (e.g., variations in attacker TTPs).
Beyond keeping content current, the SOC must also evaluate the effectiveness
and accessibility of the playbooks. This involves developing metrics to gauge:
• Utilization patterns: Identifying playbooks that are rarely or never used can
signal the need for updates or consolidation.
60
The Defender’s Advantage Respond
61
The Defender’s Advantage Respond
Investigation lifecycle
The investigation lifecycle is pivotal for unraveling the complexities of a
cybersecurity incident. Its primary aim is to uncover crucial insights about the
attack, thereby empowering stakeholders to navigate legal, regulatory, and
communication landscapes effectively. The intelligence gathered during this
phase is instrumental in shaping the strategies for incident containment, and
the ultimate eradication of the threat.
• Scope and status assessment: Evaluating the breadth of the intrusion and
determining if the threat attacker is still active in the environment
• Data exposure analysis: Assessing the nature and volume of data that
was compromised
62
The Defender’s Advantage Respond
63
The Defender’s Advantage Respond
• Automated sweeps and analysis: Automated tools can help perform initial
sweeps based on IOCs. Automated analysis should then be followed by
manual, detailed analysis for nuanced understanding.
64
The Defender’s Advantage Respond
Incident remediation
The remediation phase is crucial for eliminating threats from the environment
and restoring normal operations. It also serves as a preparatory stage for the
lessons learned phase by providing insights that can enhance an organization’s
security posture. The extent and complexity of remediation depends on the
findings from earlier phases like triage and investigation lifecycle, as well as
the scale of the impacted environment and any operational considerations
that require minimal downtime for critical operations (e.g., systems supporting
human safety).
For many incidents, remediation involves straightforward actions to cut off the
attacker’s access. These measures may include disconnecting or isolating
the compromised systems, disabling affected user accounts, changing
passwords, or blocking known malicious connections. Some of these actions
may even be able to be taken automatically, following the triggering of specific
playbooks within a SOAR. However, situations where an attacker has extensive
system access or involving multiple entry points, long-term presence, or
complex threat landscapes require a more detailed and planned approach.
65
The Defender’s Advantage Respond
Minimize impact
Mitigate, repeat,
compromise
Learn and
Eradication Restoration improve
66
The Defender’s Advantage Respond
Structuring the remediation phase to address both immediate threats and long-
term security enhancements, while also empowering analysts with the tools
and authority to act decisively, can help organizations to effectively mitigate
threats and strengthen their resilience against future attacks.
67
The Defender’s Advantage Respond
Containment
The primary objective of the containment stage within incident response is
to curtail the attacker’s access to an organization’s environment and mitigate
further damage. This stage is crucial as it supports ongoing investigative
efforts and lays the groundwork for a comprehensive eradication strategy.
68
The Defender’s Advantage Respond
• Traffic control: Identifying all egress paths and implementing robust control
to restrict unauthorized data exfiltration
Identifying and evaluating key actions against known attacker behavior during
this phase is critical to limiting the scope and impact of the incident, while
also reducing the extent of eradication activities that will be required later on.
Playbooks, documentation, and checklists can help guide responders and
expedite conscientious decision-making activities. All containment actions
must be coordinated carefully with various stakeholders to ensure that the
impact on business operations is minimized and that all actions are compliant
with legal and regulatory requirements. This collaborative approach ensures
69
The Defender’s Advantage Respond
that the containment strategies are robust, comprehensive, and tailored to the
specific needs and vulnerabilities of an organization and the ongoing incident.
Eradication
The eradication stage is a critical component of incident response, focusing on
completely removing unauthorized access and restoring full control over the
affected systems. Depending on the specific circumstances of the intrusion, the
actions in this stage can be carried out concurrently with containment efforts,
especially in urgent situations involving active threats like data exfiltration.
70
The Defender’s Advantage Respond
The timing of eradication efforts is crucial. In scenarios where the threat involves
active exfiltration of data, immediate disruptive actions are necessary to mitigate
damage while a more thorough eradication plan is developed. This might
involve initial quick fixes that are later followed by sustainable security measures.
Eradication efforts are closely linked with the broader incident response process,
particularly the containment and lessons learned stages. Insights gained during
eradication inform future prevention strategies, helping to refine an organization’s
overall cybersecurity posture and resilience against new threats.
71
The Defender’s Advantage Respond
Security enhancement
The security enhancement and lessons learned stage serves as the final phase
in the remediation process, focusing on reinforcing an organization’s defenses
to minimize the likelihood of future security breaches and to improve an
organization’s response capabilities if an incident does re-occur. This stage is
crucial because attackers often re-target organizations they have successfully
compromised before. Therefore, taking aggressive measures to strengthen the
environment and response team capabilities post-remediation is essential.
One of the primary objectives of this stage is to conduct a thorough root cause
analysis of the incident. Understanding the underlying causes of the attack
is fundamental to preventing similar incidents in the future. This analysis not
only helps in identifying the specific weaknesses that were exploited but also
informs an organization’s ability to fortify those areas against future attacks.
This may include rule changes, configuration updates, or security awareness
training for personnel.
72
The Defender’s Advantage Respond
73
The Defender’s Advantage Respond
Ultimately, the goal of the security enhancement stage is not just to recover
from a specific incident but to move an organization towards a more proactive
security posture. This involves continuous improvement of security practices,
regular reviews of the security landscape, and swift adaptation to new threats.
By effectively implementing this stage, organizations not only recover from the
immediate impacts of an attack but also build stronger defenses that reduce
the risk of future incidents and enhance their resilience in an ever-evolving
cybersecurity landscape.
Investigation accelerators
The technical demands of investigation, such as malware analysis, often exceed
the in-house capabilities of many organizations. Developing these specified
skills internally can be both costly and challenging, particularly when it
comes to retaining talent. An effective solution is to forge partnerships with
specialized consulting firms that offer targeted incident response and crisis
74
The Defender’s Advantage Respond
Eric Scales
Vice President, Mandiant at Google Cloud
Consider outsourcing for defined, specialized skill sets that may not be present
in-house:
75
The Defender’s Advantage Respond
• Training and simulations, to diversify the training provided to the team, and
ensure comprehensive coverage of topical subjects.
76
The Defender’s Advantage Respond
77
The Defender’s Advantage 00
78
The Defender’s Advantage Validate
79
The Defender’s Advantage Validate
Andrew Roths
Distinguished Security Engineer, Uber
80
The Defender’s Advantage Validate
81
The Defender’s Advantage Validate
Digital Footprint
Multi-cloud Cloud-Hosted
Infrastructure Applications
Extending Visibility
On-Prem
Suppliers
Infrastructure
Employees
Critical assets that are typically overlooked or left off the list of assets within
the attack surface include:
82
The Defender’s Advantage Validate
83
The Defender’s Advantage Validate
Evan Peña
Senior Regional Leader of Global Proactive Services,
Mandiant at Google Cloud
• Blue Teams attempt to detect and prevent the actions of a Red Team and
when they are unsuccessful in doing so, take the data provided by Red
Teams and remediate where needed to optimize security effectiveness. The
Blue Team relies on the Red Team’s findings to tune controls and address gaps
and vulnerabilities. Red and Blue Teams typically perform their functions in
an asymmetric mode of operation.
• Purple Teams bring Red and Blue Teams together to work in a more collabor-
ative fashion. These teams often leverage automated security validation
tests integrated with threat intelligence. This lets Red Teamers test controls
with multiple step-by-step scenarios to demonstrate how the security
technologies and the Blue Team perform against the threats most likely
targeting an organization. For Blue Teams, automated validation testing
delivers prescriptive analytics that allows metrics showing improvement in
the effectiveness of their controls and operations over time while still having
meaningful red team curated tests executed.
84
The Defender’s Advantage Validate
85
The Defender’s Advantage Validate
Visibility. Event data and telemetry that may or • Firewall flow or session log
may not be related to a security event with basic connection
information (SourceIP,
DestinationIP, Port)
• State. Events related to session state and • A log from an EDR indicating
identification. These do not identify malicious activity is present
security-related behavior, rather any type of on an endpoint
communication. These may be relevant for
post-compromise investigation; however,
they do not provide context related to
malicious activity
86
The Defender’s Advantage Validate
Intelligence-led validation
Intelligence-led validation refers to a structured approach of evaluating an organi-
zation’s defenses based on the TTPs threat actors are most likely to leverage
against an organization. The process involves identifying the top threats of
concern, testing the environment against those threats, categorizing the results
of those tests, and remediating identified gaps. An intelligence led approach
most often involves the use of security validation testing platforms, but can
also be conducted periodically through the use of red teams or purple teams.
Prioritizing how and what to test requires active adversary intelligence about
what threats are most relevant to the company. Cyber defense organizations
should not limit threat intelligence to historical analysis, but data that informs
what attackers will likely do next, who they will target, and what methods they
will use. As a first step in the validation process, the Intelligence can identify the
threats that matter and drive a validation strategy. This insight enables security
teams to execute relevant validation content and attacker TTPs to challenge
security controls.
87
The Defender’s Advantage Validate
Security
Validation
Mitigate and Remediate Process Gather TTPs
Detection Engineering works Threat intelligence reveals
closely with Security Validation the TTPs employed by UNC3443
to review any identified gaps and after initial access typically involve
works to remediate and lateral movement and network
mitigate them reconnaissance
Identify Gaps
Security Validation teams
perform testing of specific UNC3443
activity in the environment to identify
any potential gaps in detection
or alerting
88
The Defender’s Advantage Validate
Example scenario
89
The Defender’s Advantage Validate
Tabletop exercises can test preparedness across differing scenarios and can be
designed for both Executive and Technical-level participants. Both approaches
are key to validating an organization’s incident response plans. Executive level
exercises simulate strategic-level scenarios with significant business impact.
These scenarios are aimed at providing insight into communications flows,
processes, and procedures involving executive level staff spanning business
units not typically associated with security. Executive exercises might involve
legal counsel, communications, and human resources in order to evaluate
preparedness to respond to an organization-wide ransomware incident.
90
The Defender’s Advantage Validate
Executive Technical
Level Exercises Level Exercises
91
The Defender’s Advantage Validate
92
The Defender’s Advantage Validate
93
The Defender’s Advantage Validate
Decision authorities:
Who has technical decision-making authority during an
incident—including the decision to quarantine an endpoint,
re-image a device, or reset passwords?
Engagement of third-parties:
When should third-parties be engaged to provide incident
response and technical assistance?
94
The Defender’s Advantage Validate
Decision authorities:
Which containment activities can be executed by the
responder immediately? Which containment activities
require additional approval or assistance?
Decision authorities:
Which remediation activities require additional approval or
assistance? When does the Mission Control function need to
be informed or involved?
95
The Defender’s Advantage Validate
• Ransomware
• Insider threat
• Data exfiltration
• Lateral movement
96
The Defender’s Advantage Validate
97
The Defender’s Advantage Validate
98
The Defender’s Advantage Validate
Commonly Targeted
Technology
TTPs
Common Attack
Vulnerability
Scanning Vectors
Are We Vulnerable?
Motivation
Espionage and Cyber Crime
Figure 11: Example of intelligence feeding the threat exposure management process
99
The Defender’s Advantage Validate
Evaluating the likelihood of attack success and estimating the highest potential
impact by analyzing all potential attack paths to the most critical assets is also
a part of a threat exposure management program. To assess the likelihood
of a successful attack or confirm that attackers can exploit the most critical
exposures, the cyber threat intelligence (CTI) and/or vulnerability management
team should perform additional security testing using security validation to
prove which discovered vulnerability exposure could impact the organization.
The output of security validation testing can be used to prioritize exposure
remediation and hardening cyber defense gaps.
100
The Defender’s Advantage Validate
• Tune and create detection rules within the environment: Using data from
security validation testing, detection and engineering teams are enabled to
tune and enhance existing security rules to detect malicious behavior in the
environment against real world attack scenarios. New rules are developed to
close visibility gaps in the environment.
101
The Defender’s Advantage Validate
• Schedule Hunt Missions: In some cases, detection may not be feasible for
all potential actions that a threat actor may use in the environment. These
cases include living off the land techniques which may be too noisy for a
SOC to respond to on a regular basis. For techniques in which there are
known visibility gaps, threat actors of concern are known to leverage, and it
is not practical to prevent the activity, these techniques become ideal places
for threat hunting to be used to mitigate risk. In areas in which detection
is not viable, hunt missions should be scheduled to search for malicious
activity in areas in which an organization has known detection gaps.
102
The Defender’s Advantage Validate
Detection Rules
Security Capability
Update Security Policiess
Security Gap
103
The Defender’s Advantage Validate
104
The Defender’s Advantage Validate
105
The Defender’s Advantage 00
106
The Defender’s Advantage Hunt
A threat hunt has four goals aligning to the discovery of adversary activity
outside of existing detection methods and reducing dwell time.
107
The Defender’s Advantage Hunt
Scalable
Measurable
Programmatic considerations
Threat evaluation: Threat hunting should be predicated on specific threats
to inform an understanding of who is targeting an organization, their intent
and objectives, their level of sophistication, and the possible impact to your
organization if they were successful. Additional considerations when evaluating
a threat include:
108
The Defender’s Advantage Hunt
• TTPs threat actors employ during operations and evidence they leave behind
• Time the threat actor typically takes to complete their objectives from initial
contact to compromise
109
The Defender’s Advantage Hunt
Capability considerations
An effective threat hunt function should have some level of capability across
the following components to enable success:
• CTI: High-quality CTI provides insights into current threats, attacker TTPs,
and emerging trends, enabling hunters to focus on the most likely and
impactful scenarios.
• Capacity: Teams need to have dedicated time for hunt activities and have
access to the right internal subject matter experts or external resources.
110
The Defender’s Advantage Hunt
By following this structured approach, threat hunts can increase the chances of
detecting compromise.
111
The Defender’s Advantage Hunt
Once potential adversaries are identified, focus shifts to the identified threat
actor’s TTPs. These are the specific methods attackers use to infiltrate, move
within, and achieve their goals in a target network.
CTI and the associated TTPs can be derived from a variety of source to include:
• Open-source research
112
The Defender’s Advantage Hunt
Branches
Connect the
nodes, showing the
relationships and
dependencies
between them
Root Node
The attackers
ultimate goal (e.g., steal data,
disrupt services)
113
The Defender’s Advantage Hunt
2. Break it down: Break the goal down into smaller steps, asking “How could
an attacker achieve this?” at each step.
4. Analyze paths: Trace the different paths through the tree, gauging their
likelihood and potential impact. Attack trees can be valuable when
preparing for a threat hunt as they help teams focus and prioritize their
efforts on the most likely and impactful scenarios. The leaf nodes of an
attack tree correspond to specific actions and events which can be
analyzed to discover IOCs.
114
The Defender’s Advantage Hunt
Internal Network
1 2
Threat Actor Compromised Threat Actor
System DC
Threat actor dumps lsass Threat actor enumerates users that have
on compromised local admin access and finds one of the harvested
machine and harvests accounts has local admin rights on multiple
credentials. machines. Threat actor discovers one such
4 machine where a Domain Admin is logged in on.
Threat Actor
3
Threat actor leverages
Domain Admin Threat Actor
user-mode unhooking to
subvert EDR agent
Threat actor moves
functionality and steals
laterally to that machine
Domain Admin token
using WinRM.
using custom tools.
5
Domain Compromised
Attack trees can be valuable when preparing for a threat hunt as they help
teams focus and prioritize their efforts on the most likely and impactful
scenarios. The leaf nodes of an attack tree correspond to specific actions and
events which can be analyzed to discover IOCs.
Hypothesis development
The hunt pipeline culminates in hypothesis development. Importantly, each
hypothesis assumes a compromise has already occurred. During a threat hunt,
teams will try to prove or disprove this assumption by seeking evidence of the
hypothesized scenario.
115
The Defender’s Advantage Hunt
development can be guided using internal and external CTI, especially when
combined with local knowledge of an organization’s environment and critical
assets. Hypothesis creation can be aligned to and further refined with threat
trending and attacker TTPs. Ideally these would be mapped to a common
framework such as the Mandiant Targeted Attack Lifecycle, Lockheed Martin
Cyber Kill Chain®, or MITRE ATT&CK framework.
Security tools are vital, but they’re not a substitute for human
expertise. Threat hunting brings that expertise to the
forefront, proactively seeking out threats which may have
bypassed automated defenses
Muhammad Muneer
Principal Consultant, Incident Response, Mandiant at Google Cloud
116
The Defender’s Advantage Hunt
Hypothesis Inputs
Security Action
Sub-processes Assess
Determine and
Communicate Impact Scope Hunt Mission
Initiate Courses of Action
Analyze Acquire
Validate Results Search Environment
• Identify targeted data, hunt mission timeframe and potential cost limits
• Assess the value of gathering new data for a hunt mission versus using
existing data sources
117
The Defender’s Advantage Hunt
To validate results:
118
The Defender’s Advantage Hunt
To communicate impact:
119
The Defender’s Advantage Hunt
Pivoting
Pivoting is a tactic and mindset used by threat hunters to move
between data sources and improve hunt mission findings. Pivoting
provides a chance to be creative in finding unique correlations,
patterns and insights. Pivoting sources can include:
Previous hunts
• Previously observed similar activity
120
The Defender’s Advantage Hunt
121
The Defender’s Advantage 00
122
The Defender’s Advantage Mission Control
Mission Control acts as a centralized hub for coordinating and managing cyber
defense operations. It should operate as a wellspring of strategy, communi-
cation, and decisive action. It is necessary to define the fundamental purpose
for the function’s existence within the larger Defender’s Advantage concept.
When working through understanding how Mission Control fits into organi-
zation’s larger strategy, consider the below statements as starting points:
123
The Defender’s Advantage Mission Control
Validate
Detect
nd
po
nt
es
R
124
The Defender’s Advantage Mission Control
It’s imperative that an organization outline their primary goals and corre-
sponding objectives as it pertains to Mission Control. As previously mentioned,
Mission Control is the central hub for providing direction, coordination,
structure, and communications for effective cyber defense operations.
Goals Objectives
125
The Defender’s Advantage Mission Control
Overcoming challenges
An organization’s cybersecurity program will likely face a variety of technical,
organizational, and resource challenges. While these challenges may appear
daunting, or at times insurmountable, they can be mitigated through a human-
centered approach:
Prioritize: Threats to an organization are likely top of mind so critical risks and
vulnerabilities be addressed first.
126
The Defender’s Advantage Mission Control
127
The Defender’s Advantage Mission Control
• Limited resources
• Inadequate planning
• Mismatched/unbalanced workloads
• Unclear priorities
• Resistance to change
128
The Defender’s Advantage Mission Control
129
The Defender’s Advantage Mission Control
• Vulnerability Management
• Security Architecture
• Detection Engineering
• Threat Intelligence
• Threat Hunting
A gap analysis of the resulting skills matrix enables leadership in the Mission
Control function to identify training opportunities for current staff and serves
as an input to future hiring requirements. Before filling staffing gaps, formulate
job descriptions that identify the required education, training, and experience
necessary to perform each needed role.
130
The Defender’s Advantage Mission Control
131
The Defender’s Advantage Mission Control
Processes and procedures can vary in format, length, and level of detail
while maintaining effectiveness for a given organization. No matter what
documented processes and procedures look like, in order to be effective they
all share some key characteristics that make them:
132
The Defender’s Advantage Mission Control
Figure 21: Hierarchical model of Mission Control supporting processes and procedures
133
The Defender’s Advantage Mission Control
At a high level, the IRP should include the following four sections:
• Escalation matrix documents who shall be notified and when they will be
notified of an incident, based on incident category and severity.
• Metrics and service level objectives detail incident response metrics and
service level objectives that the Cyber Defense organization has set. Basic
incident response metrics include “time to detect” and “time to respond” to
an incident.
1. https://www.iso.org/standard/27001
2. https://www.nist.gov/privacy-framework/nist-sp-800-61
134
The Defender’s Advantage Mission Control
Incident Response Playbooks are documents that outline the planned actions
a Cyber Defense organization takes to effectively respond to specific security
incidents or threats. Playbooks ensure that the team follows a standardized
response process aligned to their specific mission and capabilities.
Playbooks can take various formats and may include detailed instructions,
checklists, process workflows, and references to external tools or documents.
They are designed to support manual and automated task execution. In the
latter case, Cyber Defense organizations can integrate playbook instructions
into their security orchestration workflows, streamlining processes such as:
135
The Defender’s Advantage Mission Control
SOPs are inherently more rigid than Playbooks, prescribing a specific sequence
of actions designed to be followed with minimal variation. They offer detailed
guidance, leaving little room for deviation or individual judgment. This makes
SOPs suitable to guide incident responders when using specialized tools or
services where strict adherence to protocols is essential.
The Cyber Defense organization must regularly schedule and conduct IRP
drills to guarantee the plan’s effectiveness and keep incident responders’
skills honed. Testing drills can take diverse forms as described in the Validate
function. Regularly testing the IRP helps an organization in:
136
The Defender’s Advantage Mission Control
A robust metrics framework for Cyber Defense operations can be built upon
these four pillars:
137
The Defender’s Advantage Mission Control
3. https://verisframework.org/
138
The Defender’s Advantage Mission Control
Gerry Stegmaier
Law Partner, Reed Smith LLP
The pace, risk and duration of a cyber attack varies, from the immediacy of the
attack to longer term remediation and recovery stages, all impacting organi-
zational capability including communications.
139
The Defender’s Advantage Mission Control
Every cyber incident presents unique challenges, but key principles guide
effective communication management during an incident:
140
The Defender’s Advantage Mission Control
Clarity of purpose and scope is crucial for Mission Control to coordinate effec-
tively with the other five Defender’s Advantage functions. Coordination among
all Cyber Defense functions is essential for effective security incident response.
Mission Control’s role is crucial in providing guidance and support to the other
Cyber Defense functions throughout the entire incident response lifecycle.
Before incident response is activated, Mission Control can identify staffing and
resource needs for proactive threat identification (Hunt), and align detection
engineering requirements with business and risk priorities (Detect). During
active response to security incidents, Mission Control can provide decision
support and effort prioritization guidance (Respond). After an incident is
resolved, Mission Control can support post-mortem analysis and drive
improvement initiatives (Validate). Finally, and throughout the whole incident
response lifecycle, Mission Control can support identification of intelligence
requirements and ensure alignment between Intelligence and other Cyber
Defense functions (Intel).
141
The Defender’s Advantage 00
142
The Defender’s Advantage Activate
Stakeholder buy-in
A successful Cyber Defense program is one that partners with other business
leaders to establish a metered risk mitigation strategy against other risks
facing an organization. Cyber attacks, while serious and often with significant
business impacts, are only one of the risks facing today’s organizations. In
order to prioritize an organization’s limited resources, it is critical that leaders
of the Cyber Defense program can articulate the business risks and impact of
cyber attacks against an organization. This translation from highly technical
cyber threats into business terms that can be consumed by executive leaders
and the Board of Directors is absolutely critical for building stakeholder buy-in.
143
The Defender’s Advantage Activate
Dawn Marie-Hutchinson
Chief Information Security Officer
Staffing considerations
According to the 2023 ISC2 Workforce Study, the cybersecurity staffing gap
grew 12.6% in 2023 to nearly four million positions. Automation of defenses,
including advances through the implementation of AI solutions, can be
put in place to relieve some of the workload and reduce burnout that comes
from sifting through mountains of data for many hours, day after day. By 2025,
lack of talent or human failure will be responsible for over half of significant
cybersecurity incidents.4
144
The Defender’s Advantage Activate
Leveraging accelerators
Business priorities continue to change, and as they do, so too does the focus
provided by an organization’s cybersecurity team to critical Cyber Defense
tasks. This can distract from the essential mission of Cyber Defense
teams and detract from the Defender’s Advantage that the team should focus
on maximizing.
Gary Winder
IT Network Engineer, Baptcare
145
The Defender’s Advantage Activate
Andi Hill
Product Owner-Cybersecurity, Movement Mortgage
146
The Defender’s Advantage Activate
Example
147
The Defender’s Advantage 00
148
The Defender’s Advantage Conclusion
Conclusion
The threat actors attacking organizations in the cyber theater today are
relentless and will stop at nothing to get access to an organization’s most
critical assets. They are greater in numbers, have more resources, and are
not bound by the same governmental and regulatory restrictions that limit an
organization’s Cyber Defense program. By all accounts, they should have the
advantage. Afterall, a threat actor only needs to be successful once; a Cyber
Defense program needs to be successful 100% of the time.
They Hunt for any evidence of adversary activity in their environment and
feed the results, both from identified threat actor activity and from any of their
actions that emulated threat actor activity, back to the other functions of the
Cyber Defense program.
149
The Defender’s Advantage Conclusion
They define their Response procedures and regularly exercise them to ensure
operational excellence in cyber response capabilities.
150
The Defender’s Advantage Conclusion
Contributors
Alex Flores Kerry Matre
Alexa Rzasa Lisa Dobson
Alishia Hui Matt Acunto
Angelo Perniola Muhammad Muneer
Brandon Gilbert Nate Toll
Caleb Hoch Neal Gay
Camile Felx Leduc Nick Bartosch
Chris Ingram Omar Toor
Christopher Satanek Pablo Nova
Colby Gilbert Paul Kolars
Dan Nutting Paul Shaver
Dan Wire Ryan Taylor
Doug Foss Tim Tuller
Emily Cranston Todd Keith
Glen Chason Travis Fry
Jason Brown Trisha Alexander
John DeLozier Ya’aqov “Jim” Meyer
151
The Defender’s Advantage Conclusion
152
We are facing off against adversaries in our
own environments. This provides an advantage
arising from the fact that we have control of the
landscape that is under attack. Organizations
struggle to capitalize on this advantage. As
security organizations, we must activate our cyber
defenses, advancing capabilities from a prepared
state to active duty. This activation is guided by
Intelligence and orchestrated through the other
critical functions of Cyber Defense: Detect,
Respond, Validate, Hunt, and Mission Control. It
is through this activation that we can take control
and galvanize our defender’s advantage.
cloud.google.com/security/mandiant