Every year, vulnerabilities are discovered and registered to a Common Vulnerabilities and Exposures (CVE) ID by the MITRE Corporation. Each vulnerability’s details are recorded, and specialists also include how to mitigate them under their CVE ID. Vulnerabilities that can affect industrial control system (ICS) environments are identified to the public through advisories by the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT).
In this blog series, our team conducted an in-depth look at ICS vulnerabilities using MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) for ICS. We chose ATT&CK because we believe it to be the best existing framework for analyzing cyberattacks by skill sets, tools, targets, and possible impact due to its basis in real-world observation of cyber attackers’ methods. We also used the Purdue model as it maps an operational technology environment into layers that can be used to show the potential impact.
Read more…
Source: Trend Micro