05.08.2016 Views

Problem

us-16-Weston-Windows-10-Mitigation-Improvements

us-16-Weston-Windows-10-Mitigation-Improvements

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

REDTEAM:<br />

Model real-world attacks<br />

• Model attacks based on<br />

ecosystem analysis and<br />

threat intelligence<br />

Identify security gaps<br />

• Measure Time-to-<br />

Compromise (MTTC) /<br />

Pwnage (MTTP)<br />

Demonstrate impact<br />

• Break-it-you-bought-it<br />

work with teams to<br />

address issues<br />

• Evaluate the customerpromises<br />

from an attack<br />

perspective<br />

• Provide data sets of<br />

detection-and-response<br />

• Attack the full stack in<br />

production configuration<br />

(software, configuration,<br />

hardware, OEMs)<br />

• Identify invariant<br />

techniques for mitigation<br />

• Simulate a real-world<br />

incident response before it<br />

occurs (process, owners,<br />

messaging)<br />

• Provide detection guidance<br />

for Defenders<br />

Assume Breach: An Inside Look at Cloud Service Provider Security - Russinovich<br />

• Design mitigations to<br />

drive up MTTC/MTTP<br />

metrics<br />

• Enumerate business and<br />

legal risk<br />

• Show business value,<br />

priorities, and<br />

investments needs with<br />

demonstrable attacks

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!