Cisos Guide To The Top Cybersecurity Frameworks
Cisos Guide To The Top Cybersecurity Frameworks
Notice
This publication is provided for information purposes only. At the time of publication, all of the
information within this publication is as accurate and current as could be determined. Any additional
data since publication will not be added or updated to this report. AttackIQ, Inc. is not responsible for
errors or omissions in the context of this report or for damages arising from the use of this report
under any circumstances. Finally, please note that this publication may be updated or changed without
notice.
Table of Contents
Notice.................................................................................................................................................2
Table of Contents..................................................................................................................................3
Executive Summary...............................................................................................................................4
Frameworks - The Big Picture.................................................................................................................5
Table - The Top 6 Leading Cybersecurity Frameworks.............................................................................................. 5
The ISO 27001 Standard Framework for ISMS Deployment...................................................................................... 6
Table - ISO 27001 Organization............................................................................................................................. 6
Table 2 - ISO 27001 Annex A Organization............................................................................................................ 7
The CIS-CSC Cybersecurity Framework..................................................................................................................... 8
Table - Five Key CIS Controls Factors.................................................................................................................... 8
Table - CIS Implementation Groups....................................................................................................................... 8
Table - CIS Security Controls for Basic, Foundational, and Organizational.......................................................... 9
The NIST Cybersecurity Framework......................................................................................................................... 10
Table - NIST Core Functionality........................................................................................................................... 10
Table - NIST Category Expansion Example by ID to Subcategory.......................................................................11
The ISACA COBIT Cybersecurity Framework........................................................................................................... 12
The Lockheed Martin Cyber Kill Chain...................................................................................................................... 14
Table - The 7 Steps in Lockheed Martin Cyber Kill Chain................................................................................... 14
The MITRE ATT&CK Cybersecurity Framework.........................................................................................................15
Table - The MITRE ATT&CK Matrix.......................................................................................................................15
Operationalize Your Cybersecurity Framework - Start With MITRE ATT&CK................................................ 16
Why MITRE ATT&CK?.................................................................................................................................................16
Operationalize MITRE ATT&CK with a Breach and Attack Simulation Platform.......................................................16
How Do You Get Started With a BAS Platform?........................................................................................................ 17
Validating Security Control Performance............................................................................................................ 17
Better Leveraging Threat Intelligence................................................................................................................. 17
Model the Most Recent and Sophisticated Attacks............................................................................................ 17
Recommendations and Conclusions...................................................................................................... 18
About AttackIQ and Informed Defense................................................................................................... 18
AttackIQ Academy.............................................................................................................................. 19
Appendix A........................................................................................................................................20
Table - Additional Cybersecurity Frameworks.......................................................................................................... 20
Copyright and Trademarks...................................................................................................................21
Executive Summary
This report will overview six of the most important cybersecurity and information technology frameworks used by
enterprises and governments today. The frameworks covered include ISO 2700, CIS Controls®, NIST CSF, ISACA®’s
COBIT® 2019, the Lockheed Martin Cyber Kill Chain®, and MITRE ATT&CK®. Appendix A in this document lists other
important frameworks.
Over the past few years, increasingly successful cyber attacks have driven frameworks into the spotlight. The
structure and best practices brought by these frameworks help organizations plan, execute, and respond faster
and better to these threats, allowing rapid return to normal business operations.
Tenable® Inc. did a survey and report on frameworks in 2016 in which 84 percent of the 338 enterprises interviewed
leveraged a security framework1. At the time of the survey, more than 44 percent used more than one security
framework. NIST CSF, CIS-CSC, and ISO 27001 were prominent across the surveyed institutions. Not surprisingly,
banks and financial institutions had the highest framework adoption rate at that time.
In 2020, the rate of framework adoption has greatly accelerated. Data suggests that in large global enterprises,
market share for CIS-CSC, ISO 27001, and ISACA’s COBIT (5 & 2019) is well over 30 percent each. Most have
multiple frameworks in use. These frameworks are all popular, along with NIST CSF and the expanded family of
NIST cybersecurity standards.
MITRE ATT&CK has also arrived on the scene and is going through rapid adoption due to its unique attributes
and special orientation. MITRE ATT&CK presents the best way to think like an attacker and understand and
anticipate the tactics, techniques, and procedures they will use. MITRE ATT&CK takes cyber defense planning and
preparation to the edge of what is possible today.
The reason for this growth in adoption is simple: the use of cybersecurity and information technology frameworks
is compelling. Frameworks give you a top level plan to organize governance, build out a highly functional
organization, address threats and challenges, and more. Many organizations have difficulty with using these
frameworks in practice. How do you operationalize frameworks in a way that can provide rapid tangible benefits?
To illustrate how quickly you can get a framework into operation, this report will share a best practice example
of how to rapidly and effectively operationalize MITRE ATT&CK. MITRE ATT&CK is a specialized framework that
helps organizations directly address and defeat the tactics, techniques, and procedures (TTPs) of the most
sophisticated cyber attackers. MITRE ATT&CK is complementary to these other major frameworks and works well
with automated approaches.
Once you have operationalized MITRE ATT&CK, you will be able to answer difficult questions about the
performance of your security controls as configured and your ability to mitigate new and emerging threats.
All of these frameworks provide a set of guidelines, standards, and best practices to reduce enterprise risk.
Frameworks give managers a reliable and battle-tested way to use best practices that help align information
technology and cybersecurity management and governance to the enterprise goals.
In some cases cybersecurity frameworks are mandatory, based upon compliance and regulatory requirements.
Some may be mandated by the government, others, by private industry consortiums. For example, if you want
to use credit cards in the United States to handle financial transactions in your business, you will need to be in
alignment with the PCI-DSS standard. Other major compliance regulations, such as HIPAA, GDPR, and NERC CIP,
bring their own well-defined cybersecurity frameworks requirements.
1
https://static.tenable.com/marketing/tenable-csf-report.pdf
Cybersecurity is a major driver for framework adoption. Compliance regulations also bring mandatory
cybersecurity frameworks which are also key drivers. Some of the frameworks are designed to help you design,
organize, deploy, and manage a complete information technology and cybersecurity architecture. Others focus on
one area or industry, such as banking and finance for PCI-DSS or healthcare for HIPAA.
You will note that we classify compliance regulations such as GDPR and HIPAA as frameworks because they
specify detailed approaches to the protection of data and the corresponding IT infrastructure and security
controls. Others focus on top level strategy, such as Zero Trust. Zero Trust is an important cyber defense strategy
that supplements and evolves past the basics of defense in depth.
The ISO 27001 standard is a compendium of best practices to support the design, deployment, and management
of an Information Systems Management System (ISMS). An ISMS puts into production the cybersecurity
framework which will address the mitigation and reduction of cybersecurity risks.
ISO 27001 is highly scalable and can work with any type of organization, including government as well as
commercial enterprise. At a conceptual level, ISO 27001 does not spell out specific security controls but instead
links to the important companion standard, ISO 27002, which includes more detailed guidance on the best
practices to build out a complete ISMS and provides more data on specific security controls.
The ISO® organization (International Organization for Standardization) includes representatives from over
150 national standards organizations. These representatives come together to build consensus and deliver
international standards to help support product safety and development.
As we drill in, we will see that ISO 27001 consists of 14 security control clauses. These security control clauses in
turn contain 35 main security categories and 114 controls (as of ISO/IEC 17001:2013). In terms of the structure,
security control categories spell out the objectives and the corresponding security controls that can support
reaching these objectives. Annex A of the ISO 27001 standard provides a view of the security controls organized by
clause, category, and the security controls in a category.
ISO 27001 (and the related ISO 27002) enables CISOs to build out a highly competent cybersecurity framework that
can substantially improve cyber defense and reduce overall business risk. Implementing an information security
management system by following the ISO 27001 model will provide your enterprise with a system that will help to
minimize the risk of security breach.
An effective ISO 27001 information security management system provides a management framework of
policies and procedures that will help your organization keep your networks and data secure. By developing and
maintaining a well structured and documented system of controls and management, risks can be identified and
reduced.
The CIS CSC framework is popular and has been adopted by over 30 percent of major organizations worldwide.
The CIS Controls framework supports and builds upon the idea that “offense informs defense.” Data from actual
attacks is used to assemble the CIS controls database to improve cybersecurity resiliency and effectiveness.
The CIS Controls framework is organized around 20 security controls. This also includes sub-controls as required.
All of this is focused on positioning known best practices against the threats which your enterprise is expected to
face.
Prior to implementing CIS Controls, you must review the characteristics of your organization against the profile
assigned to each of three implementation groups. You must also perform a risk assessment using the CIS risk
assessment model.
This, in turn provides, guidance as to which CIS Controls should be used by your organization. CIS Controls are
defined by category:
The CIS Controls framework is a useful guide for CISOs to improve cyber defenses and reduce overall cyber risk.
CIS Controls is focused on stopping the most likely attacks. It helps you prioritize controls to help minimize risk for
the resource mix you have. The critical security controls are generally based on the most likely attacks as derived
from the most current threat intelligence reporting. These are validated by government and industry experts,
and the critical security controls are updated as soon as security researchers analyze the data and provide new
recommendations.
The NIST CSF consists of five high-level core components that, in turn, consist of 23 categories and 108
subcategories. The Core is a set of desired cybersecurity activities and outcomes organized into Categories and
aligned to Informative References. The Framework Core is designed to be intuitive and to act as a translation layer
to enable communication between multi-disciplinary teams by using simplistic and non-technical language. The
Core consists of three parts: Functions, Categories, and Subcategories. The Core includes five high-level functions:
Identify, Protect, Detect, Respond, and Recover. These five functions are not only applicable to cybersecurity risk
management, but also to risk management at large. The next level down is the 23 Categories that are split across
the five Functions. The image below depicts the Framework Core's Functions and Categories.
The five subcategories pictured from the Business Environment Category (ID.BE) in the chart above provide an
example of outcome-directed goals. There is another column not shown in the above chart that would be to the
right. This column, Informative References, provides references to other standards such as ISO27001, COBIT 5,
NIST SP 800-53, and others.
NIST implementation tiers helps organizations categorize their operating processes into four tiers: 1 - Partial, 2 -
Risk Informed, 3 - Repeatable, and 4 - Adaptive. Tiers describe the degree to which an organization’s cybersecurity
risk management practices exhibit the characteristics defined in the framework. The Tiers range from Partial (Tier
1) to Adaptive (Tier 4) and describe an increasing degree of rigor, how well integrated cybersecurity risk decisions
are into broader risk decisions, and the degree to which the organization shares and receives cybersecurity
information from external parties.
If a risk assessment determines that not all potential endpoint devices are in the database, this would be classified
as 1 - Partial, identifying it for improvement.
Profiles represent the organization's assessment of its organizational requirements and objectives, trade-offs
against risk, and resources available against the targeted outcomes in the NIST Framework Core. Profiles can
compare a “Current” Profile with a “Target” Profile to maintain focus on improvement. Profiles help an organization
optimize its cybersecurity framework to best protect the organization.
The creation and gap analysis of these profiles helps an enterprise prioritize their implementation planning and
execution. The priority, work required, and estimated cost of remediation and improvement help the enterprise plan
and budget necessary cybersecurity activity.
The NIST CSF Framework provides a standard language that all stakeholders can understand and a highly
systematic methodology. NIST CSF includes suggested activities that can be incorporated in a cybersecurity
program which can meet any commercial or government enterprise needs. NIST CSF is designed to complement
existing enterprise cybersecurity programs and risk management processes.
COBIT 2019 substantially upgrades the framework for both enterprise and government by directly addressing
current technologies and, most importantly, current cybersecurity trends. COBIT 2019 has a heavy emphasis on
security and risk management as well as associated information governance. The biggest differences between
COBIT 2019 and the previous version, COBIT 5, include the expansion from five to six governance principles, 37 to
40 processes, and the addition of governance framework principles.
• COBIT 2019 Framework - Introduction and Methodology. The COBIT 2019 framework overviews the
governance principles and key concepts. This guide presents the structure of the overall framework and the
COBIT Core Model.
• COBIT 2019 Framework - Governance and Management Objectives. This publication provides a description
of the COBIT Core Model and all of the 40 governance and management objectives which it contains.
Objectives map to the related process, goals, and governance, and management practices.
• COBIT 2019 Design Guide. The new COBIT 2019 design guide provides direction on how to put COBIT into
use and how to build out a governance system to any enterprise’s needs, defining and explaining various
design factors.
• COBIT 2019 Implementation Guide. The COBIT 2019 Implementation Guide provides a path for continuous
improvement on governance needs.
COBIT 2019 has six basic governance system principles, expanding and redefining the five governance principles
in COBIT 5. These include:
Governance framework principles have also been added to COBIT 2019. This includes:
• A conceptual model — this is to identify key components and relationships among the components to
maximize consistency and enable automation.
• Open and flexible — this calls out the addition of new content and the ability to address new issues in a
flexible way.
• Aligned to major standards — this third principle notes that the model should be in alignment with major
frameworks, standards, and regulations.
The use of COBIT 2019 is considered compelling by many of their users. The expanded focus of COBIT 2019 brings
many important new features and addresses current governance topics such as small and medium businesses,
digital transformation and the risks it brings, cloud computing, data privacy, cybersecurity, and securing the devops
cycle.
COBIT 2019 delivers considerable capability and advantage to any enterprise. It is simple, easy to use, flexible,
and it supports many different types of enterprise and threat environments. It provides one of the best common
platforms for enterprise leadership to use for communications about information technology related goals and
results. COBIT 2019 also provides a best practices path to optimize cyber defense environments, so as to mitigate
the ongoing cyber threats faced today.
Today, the Kill Chain is part of Lockheed Martin’s bigger vision for Intelligence Driven Defense®. Intelligence Driven
Defense is strategy which focuses resources on stopping the offensive activity of a cyber attack while maintaining
a strong defensive posture. Attackers are constantly evolving their tactics, techniques, and procedures — the
defenders need to do so at a faster pace. Lockheed Martin’s five components of Intelligence Driven Defense
speak to:
In mapping out the attacker’s activity in a cyber attack using the Cyber Kill Chain, security operations analysts
can more rapidly identify the steps where this Kill Chain can be broken as the attack unfolds. This is all about
anticipating the next moves of the attacker and shutting the attack down. For this reason, the use of the LockHeed
Martin Cyber Kill Chain framework has been compelling and remains a basic tool for most SOC analysts worldwide.
With MITRE ATT&CK, you can review your security controls and gain visibility into gaps in your defenses. Security
management can rapidly and easily identify critical problems for remediation. This objective assessment provides
a data-driven approach to prioritizing and scaling your cybersecurity program and budget.
MITRE ATT&CK has brought a well-matured taxonomy of the tactics and techniques that may be leveraged by
any prospective attacker. This provides, for the first time, a common lexicon that enables stakeholders, cyber
defenders, and vendors to clearly communicate on the exact nature of a threat and the objective assessment of
the cyber defense plan that can defeat it. This common lexicon brings a universal language that can be used to
describe the procedures of an attacker or attack tools and exactly the techniques which they deploy. The precise
lexicon of MITRE ATT&CK enables more precise assessment of threats and a faster, better-targeted response.
The MITRE ATT&CK Matrix for Enterprise provides a complete view to all of the attacker techniques for Windows,
Linus, and MAC. Each of the 12 tactics (columns) include from between nine to 67 techniques. Note that many
techniques are used by multiple tactics. You can get a sense of this organization based upon the Table below.
Tactics define the specific goals of the attacker. For example, one primary tactic is Privilege Execution. The
Privilege Execution Tactic column includes all of the techniques that an attacker might use to try and gain higher-
level permissions that would then be used, in turn, to compromise your defenses.
MITRE ATT&CK Groups help you identify attackers more precisely. This database shows you all of the known
names and suspected identifies of attackers. Importantly, it also shows you which techniques and software tools
are attributed to the different attacker groups. This section has 90-plus groups defined and continues to grow
as more threats are identified. Note that this data is not necessarily complete — it is as available based upon the
sources that MITRE monitors on an ongoing basis.
MITRE ATT&CK is an excellent place to start to bolster your cyber defenses, reduce risk, and objectively assess the
performance of your security controls. Once again, it is highly complementary to every other framework, especially
widely used frameworks such as ISO 27001, NIST CSF, CIS-CSC, ISACA’s COBIT 5, and ISACA COBIT 2019. You can
start with one or more of these in place, or you can add these later. MITRE ATT&CK is a great place to start and can
help you begin reducing risk immediately.
BAS platforms provide automation that enables the platforms to work autonomously and to scale to support the
largest global enterprise. Support for live production environments enables you to see in real time how changes
to configurations or administration can open new vulnerabilities in your cyber defense. This is vital, as these are
frequent sources of vulnerabilities discoverable by cyber attackers.
You can use the MITRE ATT&CK tactics and techniques to help you both measure the efficacy and configurations of
your security controls and validate their performance against your assumptions. Security control categories might
include data loss prevention (DLP), endpoint detection and response (EDR), web filtering, firewalls, and more.
This valuable capability allows you to immediately validate that your security controls are configured correctly,
performing as expected, and delivering the return on investment that you expect. The goal is to keep it simple.
The average enterprise may have as many as 75 security products, so it helps to start by prioritizing this list and
selecting the first five that are highly critical to your business operations.
For example, firewalls are fundamental to your security stack. BAS will enable you to test this important control,
including network segmentation, application control policy enforcement, and malware protection. Another
important category you might select is EDR, where you similarly could test suspicious and/or anomalous endpoint
activities.
By using BAS to complete end-to-end testing of critical areas for which you assume you have defensive coverage,
you will be equipped with objective data in the form of a report to present to your team to prioritize remediation
of gaps. This report can also be shared with management and other business units within your organization to
communicate the state of your security posture.
Threat intelligence programs develop from the experience your organization has gained from internal events as
well as the data you may acquire externally. Threat intelligence data is dynamic — it is constantly changing based
upon your experience. The MITRE ATT&CK knowledge base enables you to turn your tactical experience into a
strategic threat intelligence capability.
If your security program is mature and you have implemented a threat intelligence program with a dedicated team
within your organization, you can leverage that intelligence within the BAS platform. This can include knowledge of
past breaches that your organization has withstood and likely attacks that you expect might occur given external
intelligence information.
By operationalizing MITRE ATT&CK, you can determine if your cyber defenses can stand up to the most recent
and sophisticated attacks. You will know if your existing cybersecurity stack will detect and prevent it and if your
security operations team will be able to respond to such a combination of attack techniques effectively. You will
be enabled to objectively test your cyber defense strategy, security controls, and supporting procedures and
personnel.
As you implement your chosen frameworks, consider the operationalization of MITRE ATT&CK supported by the
automation of a breach and attack simulation platform. A BAS platform will validate the real-time production
performance of your security controls, better integrate threat intelligence, and help you understand the ability of
your defenses to meet (and defeat) new and emerging threats.
The AttackIQ Informed Defense Architecture (AIDA) enables a transparent and completely manageable attacker
kill chain testing methodology. By combining the ability to emulate attacker behavior in the early stages of attack,
lateral movement behaviors through communication between test points, and using current and highly integrated
network threat packet captures; AIDA affords the most comprehensive automated security testing platform
available.
The AttackIQ Informed Defense solution is built on an industry-first unified architecture that:
• Allows security teams to take advantage of the most comprehensively MITRE ATT&CK-aligned library of
known attacker tactics, techniques, and procedures (TTPs) and includes an open platform that enables
these TTPs to be tailored or tester defined.
• Provides an integrated testing architecture that allows customers to closely emulate threat actor behaviors
across the entire adversary kill chain. From execution to defense evasion, from credential access to lateral
movement, even including attackers living off the land.
• Invokes the integration of commercially-available network packet capture of threat behaviors that can be
passed between these test points which best exercises internal segmentation strategies.
• Includes external orchestration infrastructure that integrates the ability to test organizational boundary
security controls.
Combined with the company’s open system testing approach and validation tests for enterprise and cloud, the
AttackIQ Informed Defense solution ensures that customers and partners have the right content and testing
methodology at their fingertips. AttackIQ’s mission is to help organizations continuously optimize their security
programs’ effectiveness. The best way to do this is with a unified architecture that can test from a point of breach
and test in-line security controls in production, at scale, safely. These are two different requirements. Security
teams need to be able to do both.
• The ability to promote existing AttackIQ test points staged throughout the production environment to
become traffic-replay capable.
• Intelligent PCAP session replay across inline network devices.
• Modular infrastructure in service provider cloud IaaS networks that can play the role of an internet-based
entity or target for PCAP replay.
• Options to add internet-based roles for geo-testing.
• Validation of internal security boundaries by using existing systems without having to deploy virtual
machines.
• PCAP library updates with examples of latest malware infections, command and control communications,
and other test-ready samples.
AttackIQ Academy
Customers and partners are welcome to learn how to operationalize MITRE ATT&CK, unlock purple-teaming, and
evolve their security programs into Threat Informed Defense practices by joining the AttackIQ Academy.
Appendix A
Table - Additional Cybersecurity Frameworks
Framework Description Direct Link
NIST SP 800-53 database represents the security controls and
associated assessment procedures defined in NIST SP 800-53
NIST 800-53 https://nvd.nist.gov/800-53
Revision 4 Recommended Security Controls for Federal Information
Systems and Organizations.
This publication introduces the information security principles that
https://csrc.nist.gov/publications/detail/
NIST SP 800-12 organizations may leverage to understand the information security
sp/800-12/rev-1/final
needs of their respective systems.
The Federal Risk and Authorization management Program (FedRAMP)
https://www.fedramp.gov/assets/
is a U.S. government-wide program that provides a standardized
FEDRAMP resources/documents/FedRAMP_Security_
approach to security assessment, authorization, and continuous
Assessment_Framework.pdf
monitoring for cloud-based services.
IASME Governance A governance security standard developed by the UK government. https://iasme.co.uk/
https://www.aicpastore.com/AuditAttest/
IndustryspecificGuidance/soc-2-sup--
The American Institute of Certified Public Accountants (AICPA®)
reg---sup--reporting-on-an-examination-/
developed the SOC 2 framework. SOC 2 overviews an auditing process
SOC 2® PRDOVR~PC-0128210/PC-0128210.
that ensures your service providers securely manage your data. This is
jsp?icid=hp-publications:recs:clicked:SOC+2
both to protect your enterprise and the privacy of your clients.
%C2%AE+Reporting+on+an+Examination+o
f+Controls+at+a+Service+...:PC-0128210
ETSI TR 203-305-x series of reports define a framework which https://www.etsi.org/deliver/etsi_tr/10
ETSI TC Cyber overviews a defense-in-depth set of best practices that mitigate the 3300_103399/10330501/03.01.01_60/
most common cyber attacks against enterprise infrastructure. tr_10330501v030101p.pdf
The General Data Protection Regulation (GDPR) is the toughest privacy
and cybersecurity law in the world. Though it was drafted and passed
by the European Union, it imposes obligations onto organizations
GDPR everywhere, so long as they target or collect data related to people in https://gdpr.eu/
the EU. The regulation was put into effect on May 25, 2018. The GDPR
will levy harsh fines against those who violate its privacy and security
standards, with penalties reaching into the tens of millions of euros.
The Health Insurance Portability and Accountability Act of 1995
https://aspe.hhs.gov/report/health-
(HIPAA) regulatory framework describes the protections required for
HIPAA insurance-portability-and-accountability-
sensitive healthcare information and provides corresponding direction
act-1996
with respect to cybersecurity controls and procedures.
The Health Information Trust Alliance developed the Common Security
Framework for healthcare organizations. These guidelines cover any
HITRUST CSF® https://hitrustalliance.net/hitrust-csf/
information systems that work with protected health information to
minimize risk and to improve overall cyber defense.
The PCI-DSS security framework defines payment security is required
for all entities that store, process or transmit cardholder data. These
PCI-DSS set the requirements for organizations accepting or processing https://www.pcisecuritystandards.org/
payment transactions and for software developers and manufacturers
of applications and devices used in those transactions.
The Enterprise Risk Management Integrated Framework highlights the
importance of considering risk in both the strategy-setting process
and in driving performance. The first part shares best practices on
COSO.org current and evolving concepts and applications of enterprise risk https://www.coso.org/Pages/default.aspx
management. The second part, the framework, is organized into five
components that can fit many types of operating structures, and
enhance strategies and decision-making to reduce risk.
AttackIQ® is a registered trademark of AttackIQ, Inc.; MITRE ATT&CK® is a registered trademark of The Mitre Corporation; NIST® is a registered trademark of The National
Institute of Standards and Technologies; FedRAMP® is a registered trademark of the United States General Services Administration; ITIL® is a registered trademark of the
The Lords Commissioners of Her Majesty's Treasury Acting Through The Office of Government Commerce and Central Computer and Telecommunications Agency; Cyber Kill
Chain® and Intelligence Driven Defense® are registered trademarks of Lockheed Martin Corporation; ISO® is a registered trademark of the International Organization for
Standardization; CIS®, Center for Internet Security® and CIS Controls® are registered trademarks of the Center for Internet Security; ISACA® and COBIT® are registered
trademarks of ISACA; Tenable® is a registered trademark of Tenable, Inc; Hi-Trust CSF® is a registered trademark of HITRUST.
AttackIQ, a leader in the emerging market of breach and attack simulation, built the industry’s first platform that enables red and blue
teams to test and measure the effectiveness of their security controls and staff. With an open platform, AttackIQ supports the MITRE
U.S. Headquarters
ATT&CK framework, a curated knowledge base and model for cyber adversary behavior used for planning security improvements and
9276 Scranton Road, Suite 100
verifying defenses work as expected. AttackIQ’s platform is trusted by leading companies around the world.
San Diego, CA 92121
For more information visit: www.attackiq.com. Or follow AttackIQ on Twitter, Facebook, LinkedIn, Vimeo, and YouTube.
+1 (888) 588-9116
[email protected] Copyright © 2020 AttackIQ, Inc. All rights reserved