Proactively protect your cloud infrastructure from MITRE ATT&CK tactic exploitation

Resources to stop bad actors before they get started

Expel

MITRE ATT&CK tactics are commonplace across the cybersecurity landscape, regardless of your industry. Unfortunately, so are bad actors, and they’re using those same tactics you are to pinpoint weaknesses in your infrastructure.

To help protect your cloud (and bonus–Kubernetes!) we’ve developed vendor-specific toolkits for Amazon Web Services (AWS), Glood Cloud Platform (GCP), and Microsoft Azure based on our SOC’s experience successfully navigating these common pitfalls for MITRE tactic users.

Each Mind Map Kit includes:

  • The vendor-specific mind map which connects the cloud provider and MITRE ATT&CK tactics
  • A defender’s cheat sheet to serve as a guide for how to use the mind map and to better understand the tactics, techniques, and API calls that could be involved in an attack
  • An editable mind map you can customize for your own SOC analysts to use during their investigations

Find your kit

AWS cheat sheet LP

AWS + MITRE ATT&CK Mind Map Kit

Get your AWS Kit

A cheatsheet to help your org protect against MITRE ATT&CK in Microsoft Azure

Azure + MITRE ATT&CK Mind Map Kit

Get your Azure Kit

GCP + MITRE ATT&CK Mind Map Kit

Get your GCP Kit

A cheatsheet to help your org protect against MITRE ATT&CK in Kubernetes environments

Kubernetes + MITRE ATT&CK Mind Map Kit

Get your Kubernetes Kit