Test & Evaluation¶
This section outlines the components that have been identified for the Test & Evaluation dimension as well as maturity levels within each components. These components and levels form the basis for assessing how threat-informed an organization’s T&E program is.
Test Focus: This component assesses which kinds of testing your organization conducts, ranging from compliance and IOC-focused assessments to behavior-focused testing.
Test Planning: This component assesses how well your organization plans testing and connects those tests with their overall security posture.
Test Relevance: This component assesses how quickly new CTI is ingested into your testing procedures.
Test Triggers: This component assesses if your testing is influenced by recent security events and/or proactively undergoes regular planning.
Test Results: This component assesses how well testing procedures translate into actionable changes within your organization’s security posture.
Test Focus¶
What is the focus of your organization’s testing?
- Testing is compliance-focused, e.g. security control assessment
Security control assessments evaluate whether security controls are functioning as intended.
- Testing is IOC-focused, e.g. vulnerability assessment
Commodity tools are off-the-shelf solutions that enable pen testing or red team activities using software that is well-known and easily detected.
- Testing is behavior-focused, executing a single procedure of ATT&CK techniques
Many ATT&CK techniques have different ways, or procedures, that an attacker can use to achieve the same goal. For instance,
schtask /createandregister-scheduletaskwill both achieve the technique of Scheduled Task.
Testing is behavior-focused, executing multiple procedures of a technique, perhaps using custom tooling
Test Planning¶
How are tests planned within your organization?
Testing is designed to discover detection gaps and validate coverage for your attack surface
Testing methodology is informed and prioritized by the threats and risks most relevant to your organization
Testing is collaboratively planned with defenders, to include security response and remediation components
- Testing is linked to organizational metrics or key performance indicators (KPIs) to measure effectiveness in discovering gaps, validating coverage, and performing incident response and remediation
Example KPIs: time to initial access, time to detection, time from initial access to lateral movement, number of vulnerabilities identified, % of detection evasion, % of recommendations remediated
*For more thorough details on test planning, refer to the Continuous Threat Exposure Management Framework
Test Relevance¶
How quickly is new CTI incorporated into your testing?* As new security advisories come out, can your team quickly turn those into test procedures?
Not CTI Driven or only relying on outdated CTI
Within a month
Within a week
Within a day
Test Triggers¶
Are tests planned proactively or reactively?
Reactive to external security events
Reactive to internal security events
Testing is proactively planned on a periodic basis
Testing is proactively planned on a continuous basis, perhaps through breach and attack simulation platforms
Test Results¶
How do test results drive improvements in defensive measures?
Actions are taken with internal security team to remediate individual hosts**
- Findings drive detection and architectural changes
Architectural changes improve the design of systems or networks to enhance security, e.g. strengthening key management, isolating critical subnets through network segmentation.
- Findings drive organizational or policy changes
Organizational decisions are made based on the results of security testing, e.g. business strategy shifts, changes in hiring or training.