{"id":2208,"date":"2021-02-02T04:08:01","date_gmt":"2021-02-02T04:08:01","guid":{"rendered":"http:\/\/72.52.228.46\/~itegriti\/?p=2208"},"modified":"2021-04-12T05:09:41","modified_gmt":"2021-04-12T05:09:41","slug":"mitre-shield-what-you-need-to-know","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/mitre-shield-what-you-need-to-know\/","title":{"rendered":"MITRE Shield: What You Need To Know"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p><a href=\"https:\/\/shield.mitre.org\" target=\"_blank\" rel=\"noopener noreferrer\">MITRE Shield<\/a> is an active defense knowledge base developed from the experience MITRE staff gained by implementing the MITRE ATT&amp;CK framework to improve operational planning. Many of the techniques described in the framework are foundational security controls, making MITRE Shield accessible and actionable to all organizations, regardless of size or sophistication.<\/p>\n<p>MITRE noticed that the adversary actions described in MITRE ATT&amp;CK present opportunities for the defending organizations to counteract. Out of this observation, the necessity to organize these counteractions was born which resulted in the development of MITRE Shield. This effort led to the mapping of Shield techniques to MITRE ATT&amp;CK, enabling defending organizations to develop active defense plans to exploit these opportunities to their advantage.<\/p>\n<h2 class=\"navy\">Structure and terminology<\/h2>\n<p>Shield\u2019s goal is to structure the active defense actions to avoid complexity and become a useful tool for every organization. To do so, the Shield is using terminology borrowed from the <a href=\"https:\/\/www.jcs.mil\/Portals\/36\/Documents\/Doctrine\/pubs\/dictionary.pdf?ver=2020-06-18-073638-727\" target=\"_blank\" rel=\"noopener noreferrer\">DOD Dictionary of Military and Associated Terms<\/a> and the <a href=\"https:\/\/www.jcs.mil\/Portals\/36\/Documents\/Doctrine\/dictionary\/repository\/usg_compendium.pdf?ver=2019-11-04-174229-423\" target=\"_blank\" rel=\"noopener noreferrer\">United States Government Compendium of Interagency and Associated Terms<\/a>:<\/p>\n<p>In accordance with the DoD, \u201c<strong>active defense<\/strong> is the employment of limited offensive action and counterattacks to deny a contested area or position to the enemy.\u201d Within Shield, active defense includes a handful of actions, ranging from basic cyber defense to cyber deception and adversary engagement operations. The combination of these defenses allows an organization to counter ongoing attacks and to gather intelligence on adversarial actions to be better prepared in the future.<\/p>\n<p>Like MITRE ATT&amp;CK, Shield organizes active defense actions into tactics, techniques and procedures (TTPs).<\/p>\n<ul>\n<li><strong>Tactics<\/strong> are abstract defender goals and describe the desired effect of active defense activities. They are useful to describe why a defender would choose to use a specific active defense technique. Tactics serve as useful ways to classify individual defensive techniques.<\/li>\n<li><strong>Techniques<\/strong> are general actions that can be performed by a defender. A technique may have several different tactical effects depending on how they are implemented.<\/li>\n<li><strong>Procedures<\/strong> are implementations of a technique.<\/li>\n<\/ul>\n<p>The relationship between Shield tactics and techniques is illustrated in the Shield <a href=\"https:\/\/shield.mitre.org\/matrix\/\" target=\"_blank\" rel=\"noopener noreferrer\">matrix<\/a>. The matrix consists of columns where we outline our defender tactics, and within each column are relevant techniques.<\/p>\n<p><img decoding=\"async\" class=\"alignleft size-full wp-image-2211 lazyload\" data-src=\"http:\/\/72.52.228.46\/~itegriti\/wp-content\/uploads\/2021\/02\/mitre_shield_matrix.jpeg\" alt=\"\" width=\"1187\" height=\"694\" data-srcset=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/mitre_shield_matrix-200x117.jpeg 200w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/mitre_shield_matrix-400x234.jpeg 400w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/mitre_shield_matrix-600x351.jpeg 600w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/mitre_shield_matrix-768x449.jpeg 768w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/mitre_shield_matrix-800x468.jpeg 800w, https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/mitre_shield_matrix.jpeg 1187w\" data-sizes=\"(max-width: 1187px) 100vw, 1187px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1187px; --smush-placeholder-aspect-ratio: 1187\/694;\" \/><em>Figure 1: MITRE Shield matrix. Source: <a href=\"https:\/\/medium.com\/mitre-shield\/three-simple-ways-to-deploy-an-active-defense-with-mitre-shield-95ae639a50b5\" target=\"_blank\" rel=\"noopener noreferrer\">Medium<\/a>.<\/em><\/p>\n<p>In addition to the above terminology, Shield introduces the notions of <a href=\"https:\/\/shield.mitre.org\/resources\/faq\" target=\"_blank\" rel=\"noopener noreferrer\">Opportunity Spaces and Use Cases<\/a>. <strong>Opportunity spaces<\/strong> are high-level active defense possibilities when attackers employ their techniques, while <strong>Use cases<\/strong> are high-level descriptions of how a defender could do something to take advantage of the opportunity that the attacker&#8217;s action presents.<\/p>\n<h2 class=\"navy\">Shield Tactics<\/h2>\n<p>The following table provides a quick overview of the Shield tactics.<\/p>\n<\/p>\n<div class=\"table-1\">\n<table width=\"100%\">\n<thead>\n<tr>\n<td colspan=\"1\" align=\"center\" bgcolor=\"#002868\"><strong><span style=\"color: #ffffff;\">Tactic<\/span><\/strong><\/td>\n<td colspan=\"1\" align=\"center\" bgcolor=\"#002868\"><strong><span style=\"color: #ffffff;\">Description<\/span><\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td align=\"left\">Channel<\/td>\n<td align=\"left\">Guide an adversary to follow a specific path<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">Collect<\/td>\n<td align=\"left\">Gather intelligence about adversarial actions<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">Contain<\/td>\n<td align=\"left\">Prevent an adversary from moving outside specific boundaries<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">Detect<\/td>\n<td align=\"left\">Establish and maintain awareness into adversarial actions<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">Disrupt<\/td>\n<td align=\"left\">Prevent an adversary from deploying all their toolset<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">Facilitate<\/td>\n<td align=\"left\">Enable an adversary to implement part of their mission<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">Legitimize<\/td>\n<td align=\"left\">Make deceptive components look like authentic to lure adversaries<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">Test<\/td>\n<td align=\"left\">Determine the interests, capabilities and behaviors of an adversary<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>\n<p><em>Table 1: MITRE Shield Tactics. Adapted from <a href=\"https:\/\/shield.mitre.org\/tactics\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/shield.mitre.org\/tactics\/<\/a><\/em><\/p>\n<h2 class=\"navy\">Mapping Shield with ATT&amp;CK<\/h2>\n<p>As we touched upon before, Shield defensive techniques are related to ATT&amp;CK adversarial techniques. For this reason, MITRE has developed a <a href=\"https:\/\/shield.mitre.org\/attack_mapping\/\">page<\/a> devoted to ATT&amp;CK tactics and techniques. For each ATT&amp;CK tactic a page list has been created listing the adversary ATT&amp;CK techniques associated with that tactic, and applicable active defense information.<\/p>\n<p>Leveraging ATT&amp;CK along with MITRE Shield offers the potential to create active defense playbooks to address specific adversaries. \u201cWe hope mapping Shield to ATT&amp;CK will be a good addition to the collection of ways ATT&amp;CK can be used. Using them in tandem can help defenders better understand adversary behavior and engagements and suggest ways the defender can mount a more active defense,\u201d <a href=\"https:\/\/www.mitre.org\/publications\/project-stories\/shields-up-a-good-cyber-defense-is-an-active-defense\">says<\/a> Christina Fowler, MITRE\u2019s chief cyber intelligence strategist.<\/p>\n<h2 class=\"navy\">How can businesses leverage Shield?<\/h2>\n<p>What is worth noting is that approximately one-third of the suggested tactics in Shield are related to deception. The key to deception technology is that it goes beyond simply detecting, identifying, and preventing adversarial lateral movement. With digital transformation triggered by emerging technologies rendering business boundaries obsolete, detection has become one of the most difficult aspects of network defense.<\/p>\n<p>As cyber criminals move laterally across the corporate network, they gather further information undetected, allowing them to develop more sophisticated and damaging attacks. This is where deception and active defense converge \u2013 hiding high value, real assets within numerous rogue assets that look and act exactly like the real ones. Attackers want to move fast, and they want to be 100% sure where to devote time and effort. A deceptive environment creates delays and the attackers risk revealing their identity to the defender.<\/p>\n<p>Since traps do not touch real assets, they become a highly valued solution for even the most diverse and distributed environments, including IT, OT and IoT devices. Because decoys are not visible to legitimate users or systems and serve only to deceive attackers, they deliver high fidelity alerts and virtually no false positives.<\/p>\n<p>Depending on the level of intelligence and forensics required, organizations should consider employing one of the <a href=\"https:\/\/www.helpnetsecurity.com\/2020\/09\/30\/mitre-shield-deception\/\" target=\"_blank\" rel=\"noopener noreferrer\">three levels of deception<\/a>:<\/p>\n<ol>\n<li>Low interaction, using simple fake assets designed to divert cybercriminals away from the real thing while consuming their time and resources.<\/li>\n<li>Medium interaction, offering greater insights into adversarial techniques, allowing security teams to identify attackers and respond to attacks.<\/li>\n<li>High interaction, which leverages extended interaction to collect information and provide insight into adversarial activity.<\/li>\n<\/ol>\n<h2 class=\"navy\">How ITEGRITI can help<\/h2>\n<p>Organizations are not required to employ all active defense tactics outlined in MITRE Shield to prevent attacks. However, low interaction decoys are a good place to start and can be deployed in a matter of minutes. The effectiveness and speed offered by deception and active defense techniques should force CISOs to rethink their security strategy.<\/p>\n<p>ITEGRITI is a firm believer that cybersecurity programs must be based on informed decisions and assessments. If you want to learn how we leverage MITRE Shield framework, you can visit us at <a href=\"http:\/\/72.52.228.46\/~itegriti\/\">itegriti.com<\/a>.<\/p>\n<p>You can also read our other guides in this MITRE Series:<\/p>\n<p><a href=\"http:\/\/72.52.228.46\/~itegriti\/2020\/blog\/what-is-the-mitre-attck-framework-and-why-is-it-important\/\">What is the MITRE ATT&amp;CK Framework and Why is it Important?<\/a><\/p>\n<p><a href=\"http:\/\/72.52.228.46\/~itegriti\/2020\/blog\/15-ways-mitres-pre-attck-tactics-protect-you\/\">15 Ways MITRE\u2019s PRE-ATT&amp;CK Tactics Protect You<\/a><\/p>\n<p><a href=\"http:\/\/72.52.228.46\/~itegriti\/2020\/blog\/the-fabulous-11-how-mitre-attck-ics-framework-makes-a-difference\/\" target=\"_blank\" rel=\"noopener noreferrer\">The Fabulous 11: How MITRE ATT&amp;CK ICS Framework Makes a Difference<\/a><\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>MITRE Shield\u2019s goal is to structure the active defense actions to avoid complexity and become a useful tool for every organization. Leveraging ATT&#038;CK along with MITRE Shield offers the potential to create effective and active defense playbooks.<\/p>\n","protected":false},"author":10,"featured_media":2209,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,2180],"tags":[1941],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>MITRE Shield: What You Need To Know - kw022024<\/title>\n<meta name=\"description\" content=\"MITRE Shield\u2019s goal is to structure the active defense actions to avoid complexity and become a useful tool for every organization. Leveraging ATT&amp;CK along with MITRE Shield offers the potential to create effective and active defense playbooks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/mitre-shield-what-you-need-to-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MITRE Shield: What You Need To Know\" \/>\n<meta property=\"og:description\" content=\"MITRE Shield\u2019s goal is to structure the active defense actions to avoid complexity and become a useful tool for every organization. Leveraging ATT&amp;CK along with MITRE Shield offers the potential to create effective and active defense playbooks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/mitre-shield-what-you-need-to-know\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-02T04:08:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-12T05:09:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_mitre_attck_4.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anastasios Arampatzis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"MITRE Shield\u2019s goal is to structure the active defense actions to avoid complexity and become a useful tool for every organization. Leveraging ATT&amp;CK along with MITRE Shield offers the potential to create effective and active defense playbooks.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_mitre_attck_4.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@TassosAramp\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anastasios Arampatzis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/mitre-shield-what-you-need-to-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/mitre-shield-what-you-need-to-know\/\"},\"author\":{\"name\":\"Anastasios Arampatzis\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\"},\"headline\":\"MITRE Shield: What You Need To Know\",\"datePublished\":\"2021-02-02T04:08:01+00:00\",\"dateModified\":\"2021-04-12T05:09:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/mitre-shield-what-you-need-to-know\/\"},\"wordCount\":1359,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/mitre-shield-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_mitre_attck_4.jpg\",\"keywords\":[\"12 Minute Read\"],\"articleSection\":[\"Cybersecurity\",\"Managed Services\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/mitre-shield-what-you-need-to-know\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/mitre-shield-what-you-need-to-know\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/mitre-shield-what-you-need-to-know\/\",\"name\":\"MITRE Shield: What You Need To Know - kw022024\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/mitre-shield-what-you-need-to-know\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/mitre-shield-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_mitre_attck_4.jpg\",\"datePublished\":\"2021-02-02T04:08:01+00:00\",\"dateModified\":\"2021-04-12T05:09:41+00:00\",\"description\":\"MITRE Shield\u2019s goal is to structure the active defense actions to avoid complexity and become a useful tool for every organization. Leveraging ATT&CK along with MITRE Shield offers the potential to create effective and active defense playbooks.\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/mitre-shield-what-you-need-to-know\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/mitre-shield-what-you-need-to-know\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/mitre-shield-what-you-need-to-know\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_mitre_attck_4.jpg\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_mitre_attck_4.jpg\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/mitre-shield-what-you-need-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"MITRE Shield: What You Need To Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\",\"name\":\"Anastasios Arampatzis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"caption\":\"Anastasios Arampatzis\"},\"description\":\"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.\",\"sameAs\":[\"http:\/\/www.welcometobora.com\",\"https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/\",\"https:\/\/x.com\/TassosAramp\"],\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"MITRE Shield: What You Need To Know - kw022024","description":"MITRE Shield\u2019s goal is to structure the active defense actions to avoid complexity and become a useful tool for every organization. Leveraging ATT&CK along with MITRE Shield offers the potential to create effective and active defense playbooks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/mitre-shield-what-you-need-to-know\/","og_locale":"en_US","og_type":"article","og_title":"MITRE Shield: What You Need To Know","og_description":"MITRE Shield\u2019s goal is to structure the active defense actions to avoid complexity and become a useful tool for every organization. Leveraging ATT&CK along with MITRE Shield offers the potential to create effective and active defense playbooks.","og_url":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/mitre-shield-what-you-need-to-know\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2021-02-02T04:08:01+00:00","article_modified_time":"2021-04-12T05:09:41+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_mitre_attck_4.jpg","type":"image\/jpeg"}],"author":"Anastasios Arampatzis","twitter_card":"summary_large_image","twitter_description":"MITRE Shield\u2019s goal is to structure the active defense actions to avoid complexity and become a useful tool for every organization. Leveraging ATT&CK along with MITRE Shield offers the potential to create effective and active defense playbooks.","twitter_image":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_mitre_attck_4.jpg","twitter_creator":"@TassosAramp","twitter_site":"@itegriti","twitter_misc":{"Written by":"Anastasios Arampatzis","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/mitre-shield-what-you-need-to-know\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/mitre-shield-what-you-need-to-know\/"},"author":{"name":"Anastasios Arampatzis","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673"},"headline":"MITRE Shield: What You Need To Know","datePublished":"2021-02-02T04:08:01+00:00","dateModified":"2021-04-12T05:09:41+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/mitre-shield-what-you-need-to-know\/"},"wordCount":1359,"commentCount":0,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/mitre-shield-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_mitre_attck_4.jpg","keywords":["12 Minute Read"],"articleSection":["Cybersecurity","Managed Services"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/mitre-shield-what-you-need-to-know\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/mitre-shield-what-you-need-to-know\/","url":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/mitre-shield-what-you-need-to-know\/","name":"MITRE Shield: What You Need To Know - kw022024","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/mitre-shield-what-you-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/mitre-shield-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_mitre_attck_4.jpg","datePublished":"2021-02-02T04:08:01+00:00","dateModified":"2021-04-12T05:09:41+00:00","description":"MITRE Shield\u2019s goal is to structure the active defense actions to avoid complexity and become a useful tool for every organization. Leveraging ATT&CK along with MITRE Shield offers the potential to create effective and active defense playbooks.","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/mitre-shield-what-you-need-to-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/mitre-shield-what-you-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/mitre-shield-what-you-need-to-know\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_mitre_attck_4.jpg","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/02\/itegriti_mitre_attck_4.jpg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/mitre-shield-what-you-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"MITRE Shield: What You Need To Know"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673","name":"Anastasios Arampatzis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","caption":"Anastasios Arampatzis"},"description":"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.","sameAs":["http:\/\/www.welcometobora.com","https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/","https:\/\/x.com\/TassosAramp"],"url":"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/2208"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=2208"}],"version-history":[{"count":8,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/2208\/revisions"}],"predecessor-version":[{"id":2218,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/2208\/revisions\/2218"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/2209"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=2208"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=2208"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=2208"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}