Quantifying Cyber Fitness with Active Exposure Testing
Marc Brown
Startup Enthusiast | CEO, CMO, CPO, VP Sales | Author | Driving Success with a Get-It-Done Mindset & Strategic Business Approach
Organizations are constantly under threat from increasingly agile and creative adversaries. Malware, ransomware, insider threat, and other common attack methods continue to bypass traditional security controls and inflict severe damage, from financial losses to reputational harm. As cyber attackers evolve their techniques, organizations must move beyond legacy, reactive defense methods and embrace proactive approaches to validate their resilience against real-world threats.
Adversarial Exposure Validation (AEV), as highlighted in Gartner’s Hype Cycle for Security Operations, plays a vital role in quantifying and enhancing an organization's cyber fitness through active exposure hunting. This proactive process leverages adversarial threat emulation and validation to identify and assess vulnerabilities within an organization’s cyber defenses, determining their susceptibility to successful attacks and ensuring that security teams can remediate weaknesses before adversaries exploit them. By focusing on key techniques across the Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, and Discovery tactics of the MITRE ATT&CK framework, organizations can effectively assess and enhance their capacity to detect, block, or mitigate cyber threats before they escalate into significant incidents.
By emulating and validating adversary tactics, techniques, and procedures (TTPs), AEV enables security teams to:
This paper will provide an overview of using threat emulation to baseline and improve behavioral detections across critical MITRE ATT&CK techniques, mainly focusing on common threats like malware, ransomware, and insider threats. By establishing a robust baseline, security teams can measure their effectiveness and make data-driven decisions on how to improve their security posture.
The Cyber Kill Chain and MITRE ATT&CK Framework
To fully understand where AEV fits, it is essential to review the tactics and stages of a cyber attack. The Cyber Kill Chain—a model that describes the stages of an attack from reconnaissance to exfiltration across eight stages—is one of the foundational frameworks used. Another is the SCYTHE BAM Model, which is dramatically more focused and has only three stages. The MITRE ATT&CK framework builds upon these attack chains by cataloging specific TTPs that adversaries employ at each stage of an attack.
Focusing on the early stages of the kill chain, from Initial Access to Discovery, presents an opportunity for organizations to intercept attacks before they can lead to more devastating actions like lateral movement, data exfiltration, and command and control. By addressing the early stages, organizations can greatly reduce the likelihood of successful cyber incidents, such as malware, ransomware, or insider threat attacks, and improve their cyber fitness.
Using Adversarial Exposure Validation for Cyber Fitness
When quantifying cyber fitness, the focus should be on identifying and mitigating techniques that adversaries commonly use to gain an initial foothold and move through an environment undetected. This process is like going to the doctor for your annual physical—checking your vitals, blood work, and weight for any signs of potential issues. AVE provides a comprehensive and continuous "cyber physical" of your security defenses.
For example, suppose an organization can detect and respond to behaviors associated with Initial Access, Execution, Persistence, and Discovery. In that case, it can significantly reduce or eliminate the adversary's ability to carry out more damaging actions such as Lateral Movement, Data Exfiltration, and Command and Control. By utilizing AEV, organizations can emulate real-world adversarial techniques and identify exposures or weaknesses in their security posture. This process allows teams to test their detection capabilities, endpoint defenses, and response times, highlighting gaps that could enable an adversary to gain a foothold within the organization.
Once these gaps are identified, organizations can take action to remediate and strengthen their defenses. Furthermore, the benefits of AEV exercises:
How to baseline, check, and improve cyber fitness:
Step 1: Baseline Your Cyber Fitness
The first step toward improving cyber fitness is establishing a baseline of the organization's current security posture. This involves performing an initial assessment that measures how well the organization can detect, respond, and mitigate threats at various stages of the attack lifecycle.
Key Activities:
To measure an organization's cyber fitness preparedness, use the following equation that takes into account cyber hygiene compliance and exposure preparedness scores:
Cyber Fitness Preparedness Score (CFPS) = (CHC X CEP) / 100
Where:
CEP = (P + M + R + I) / 4
Where:
Step 2: Check Cyber Fitness Regularly
Once the baseline is established, organizations must regularly test and assess their cyber defenses to maintain and improve their fitness levels. By running frequent emulations, teams can continuously check the effectiveness of their defenses and adapt to new or emerging threats.
Key Activities:
Step 3: Improve Cyber Fitness and Adapt to New Threats
Once the team has gathered insights from AEV exercises, the next step is to make informed decisions on how to improve cyber defenses, address identified weaknesses, and boost overall cyber fitness.
领英推荐
Key Activities:
Step 4: Measure Success and Quantify Improvements
To demonstrate the value of adversarial threat emulation and validation, organizations must measure the success of their cyber fitness program and quantify improvements over time.
Key Activities:
The Benefits of Improving Cyber Fitness Across Common Attack Vectors - Malware, Ransomware, and Insider Threat
Malware Risk Reduction Malware can be introduced through compromised websites, email attachments, or infected software. Once inside, malware can deploy harmful payloads that steal data, corrupt systems, or create backdoors. AEV provides a way to emulate malware TTPs (e.g., T1071: Application Layer Protocol) to ensure that existing security controls can detect, log, and block malicious software before it causes significant damage. Continuous testing helps validate security measures to protect against both known and evolving malware threats.
Ransomware Risk Reduction
Many ransomware attacks begin with phishing (T1566) or exploit known vulnerabilities (T1190). Early detection and mitigation of these techniques, especially in Initial Access and Execution, can drastically reduce ransomware risk. Emulating ransomware TTPs through AEV allows security teams to see how well their tools can detect common ransomware behaviors.
Insider Threat Risk Reduction Insider threats, whether malicious or inadvertent, present a unique challenge to organizations. Such threats often involve bypassing security measures through legitimate credentials or abusing access to sensitive data. AEV enables organizations to simulate insider threat scenarios, testing how well the security controls respond to actions like unauthorized data access or the misuse of privileges (T1078). This proactive testing helps security teams develop better policies and strengthen monitoring capabilities to reduce the risk of insider-driven incidents.
Phishing Risk Reduction
Phishing attacks are among the most common attack vectors, and they typically lead to credential theft or execution of malicious payloads (T1059). AEV can help by regularly validating how well security controls handle phishing simulations and identifying gaps in detection and response.
Other Common Attacks
In addition to common attacks, attackers often rely on weaknesses in Persistence and Privilege Escalation to maintain control over a compromised system. By using AEV to validate these techniques (e.g., T1078, T1136), security teams can catch attackers early and prevent lateral movement.
Conclusion: Building a Healthier Security Posture
Quantifying Cyber Health Improvements: AEV helps establish a baseline by simulating adversarial actions across MITRE ATT&CK techniques. Security teams can compare baseline results over time to quantify improvements in their cyber fitness.
Behavioral Detection Maturity: By continuously running campaigns focused on critical MITRE ATT&CK techniques, organizations can measure the maturity of their behavioral detections against malware, ransomware, and insider threat attack types. The more effectively an organization can detect techniques across Initial Access, Execution, Persistence, and Discovery, the less likely an attack will escalate to more severe stages like Lateral Movement or Data Exfiltration.
Feedback Loop for Continuous Improvement: AEV creates a feedback loop for continuous improvement. Each simulation provides actionable insights into where detections failed, enabling security teams to fine-tune security controls, training, and processes to close gaps.
By focusing on key Initial Access to Discovery MITRE ATT&CK techniques, organizations can proactively defend against the most common attack vectors, including malware, ransomware, and insider threats.. With Adversarial Threat Emulation and Validation, security teams can baseline their current defenses, implement improvements, and monitor their progress over time in a quantifiable manner, ensuring that their security posture evolves in a positive direction with measurable ROI.
Appendix - Common Pre-Attack Adversarial Behaviors
By focusing on a limited number of pre-attack techniques, security teams can prioritize stopping adversaries in the early stages of an attack, preventing ransomware (or phishing, malware, insider threat, etc.) from accessing critical assets and executing its payload. Disrupting tactics like Initial Access, Execution, and Persistence enables security teams to contain or mitigate ransomware threats before they escalate to the more damaging stages, such as Lateral Movement, Collection, Exfiltration, and Impact.
Of course, detecting and stopping ransomware, many additional critical detections are necessary to ensure comprehensive security and operational defense, including T1490: Inhibit System Recovery (Impact) and T1021: Remote Services (Lateral Movement).
The goal of these assessments is to identify and address critical early-stage behaviors that pave the way for later-stage tactics like lateral movement, data exfiltration, command-and-control, and impact. Identifying and mitigating these early behaviors strengthens the organization’s resilience and reduces the likelihood of a successful ransomware attack.
Top 10 MITRE ATT&CK Techniques to Help Stop or Reduce the Risks of Ransomware:
Top 10 MITRE ATT&CK Techniques to Help Stop or Reduce the Risks of Malware:
Top 10 MITRE ATT&CK Techniques to Help Stop or Reduce the Risks of Insider Threats: