{"id":30861,"date":"2023-06-27T17:32:53","date_gmt":"2023-06-27T17:32:53","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=30861"},"modified":"2023-10-17T00:36:22","modified_gmt":"2023-10-17T00:36:22","slug":"siem-mitre-attack","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/siem-mitre-attack\/","title":{"rendered":"Enterprise SIEMs Miss 76 Percent of MITRE ATT&amp;CK Techniques"},"content":{"rendered":"\n<p>Security information and event management (SIEM) systems only have detections for 24 percent of the 196 techniques in MITRE ATT&amp;CK v13, according to a new report.<\/p>\n\n\n\n<p>&#8220;This implies that adversaries can execute around 150 different techniques that will be undetected by the SIEM,&#8221; says the CardinalOps report. &#8220;Or stated another way, SIEMs are only covering around 50 techniques out of all the techniques that can potentially be used by adversaries.&#8221;<\/p>\n\n\n\n<p>The <a href=\"https:\/\/cardinalops.com\/whitepapers\/2023-report-on-state-of-siem-detection-risk\/\" target=\"_blank\" rel=\"noreferrer noopener\">Third Annual Report on the State of SIEM Detection Risk<\/a> by detection posture management vendor CardinalOps is based on analysis of configuration metadata from a wide variety of SIEM instances, including Splunk, Microsoft Sentinel, IBM QRadar, and Sumo Logic, across verticals that include banking and financial services, insurance, manufacturing, energy, media and telecom, professional and legal services, and managed security services providers (MSSPs) and managed detection and response (MDR) vendors.<\/p>\n\n\n\n<p><strong>See the <a href=\"https:\/\/www.esecurityplanet.com\/products\/siem-tools\/\">Top SIEM Solutions<\/a><\/strong><\/p>\n\n\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-top3 row\">\n    \n        <!--\n            ICP Plugin - body top3\n            ----------\n            Category: \n            Country: HK\n        -->\n    <\/div>\n<!-- ICP Plugin: End -->\n\n\n\n<h2 class=\"wp-block-heading\">Misconfigured SIEM Rules<\/h2>\n\n\n\n<p>The researchers also found that 12 percent of all SIEM rules are broken and will never fire due to issues like misconfigured data sources, missing fields, and parsing errors.<\/p>\n\n\n\n<p>&#8220;Worse, organizations are often unaware of the gap between the theoretical security they assume they have and the actual security they have in practice, creating a false impression of their detection posture,&#8221; the report states.<\/p>\n\n\n\n<p>Key reasons for that gap, according to CardinalOps, include complexity, constant change, the unique nature of each enterprise, error-prone manual processes, and challenges in hiring and retaining skilled personnel.<\/p>\n\n\n\n<p><strong>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/trends\/configure-siem-for-threat-detection\/\">5 Ways to Configure a SIEM for Accurate Threat Detection<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Plenty of Data, Not Enough Detections<\/h2>\n\n\n\n<p>At the same time, CardinalOps found that SIEMs already ingest enough data to cover 94 percent of all MITRE ATT&amp;CK techniques. &#8220;This suggests we don&#8217;t need to collect more data, but rather we need to scale our detection engineering processes to develop more detections faster,&#8221; the report states.<\/p>\n\n\n\n<p>Security layers monitored by SIEMs, according to the findings, include Windows (96 percent), Network (96 percent), Identity and Access Management (96 percent), Linux\/Mac (87 percent), Cloud (83 percent), and Email (78 percent).<\/p>\n\n\n\n<p>Still, just 32 percent monitor <a href=\"https:\/\/www.esecurityplanet.com\/products\/container-and-kubernetes-security-vendors\/\">containers<\/a>. &#8220;One explanation for this might be that, due to the dynamic nature of microservices-based application environments, monitoring them can be a hefty challenge and they are likely to bring a significant volume of data to SIEM platforms,&#8221; the report suggests. &#8220;Another explanation might be that detection engineers are challenged by the prospect of writing high-fidelity detections to alert on anomalous activity for these highly-dynamic assets.&#8221;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Key Steps to Take<\/h2>\n\n\n\n<p>The report offers four key recommendations to enhance SIEM detection coverage and quality \u2014 starting with reviewing current SIEM processes.<\/p>\n\n\n\n<p>The other three recommendations are:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Become more intentional about how you develop and manage detection content<\/li>\n\n\n\n<li>Build or refresh your use case management processes<\/li>\n\n\n\n<li>Measure and continuously improve<\/li>\n<\/ul>\n\n\n\n<p>As part of the first step of reviewing current processes, the report offers a number of avenues for inquiry:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>What is the approach for finding false negatives \u2013 and what adversary techniques, behaviors, and threats are being missed?<\/li>\n\n\n\n<li>How are use cases managed and prioritized? &#8220;Typically, we find they\u2019re added to the backlog via an ad-hoc process,&#8221; driven by a combination of:<\/li>\n<\/ul>\n\n\n\n<p>\u2022 Threat analysts and <a href=\"https:\/\/www.esecurityplanet.com\/products\/threat-intelligence-platforms\/\">threat intelligence<\/a><\/p>\n\n\n\n<p>\u2022 <a href=\"https:\/\/www.esecurityplanet.com\/products\/breach-and-attack-simulation-bas-vendors\/\">Breach and attack simulation (BAS) tools<\/a><\/p>\n\n\n\n<p>\u2022 News about high-profile attacks and vulnerabilities<\/p>\n\n\n\n<p>\u2022 Manual <a href=\"https:\/\/www.esecurityplanet.com\/networks\/penetration-testing\/\">pentesting<\/a><\/p>\n\n\n\n<p>\u2022 <a href=\"https:\/\/www.esecurityplanet.com\/networks\/red-team-vs-blue-team-vs-purple-team\/\">Red teaming<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>How are detections developed today and what is the process for turning threat knowledge into detections?<\/li>\n\n\n\n<li>How long does it typically take to develop new detections?<\/li>\n\n\n\n<li>Is there a systematic process to periodically identify detections that are no longer functional due to infrastructure changes, changes in vendor log source formats, etc.?<\/li>\n<\/ul>\n\n\n\n<p>&#8220;Most organizations don&#8217;t have good visibility into their MITRE ATT&amp;CK coverage and are struggling to get the most from their existing SIEMs,&#8221; CardinalOps CEO and co-founder Michael Mumcuoglu said in a statement. &#8220;This is important because preventing breaches starts with having the right detections in your SIEM \u2013 according to the adversary techniques most relevant to your organization \u2013 and ensuring they&#8217;re actually working as intended.&#8221;<\/p>\n\n\n\n<p><strong>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/implementing-and-managing-your-siem-securely\/\">Implementing and Managing Your SIEM Securely: A Checklist<\/a><\/strong><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6d482b129b-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6d482b129b\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6d482b129b\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6d482b129b\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6d482b129b\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6d482b129b\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6d482b129b\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Most SIEM systems are missing the vast majority of MITRE ATT&#038;CK techniques. Here&#8217;s what to do.<\/p>\n","protected":false},"author":166,"featured_media":30863,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[2369,8610,3790,3414,730,3483],"b2b_audience":[33,35],"b2b_industry":[],"b2b_product":[385,395,380,391,31776,31782],"class_list":["post-30861","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","tag-cloud-security","tag-container-security","tag-cybersecurity","tag-network-security","tag-security","tag-siem","b2b_audience-awareness-and-consideration","b2b_audience-implementation-and-support","b2b_product-cloud-saas-and-hosted-security-services","b2b_product-firewalls-and-intrusion-prevention-and-detection","b2b_product-policy-compliance","b2b_product-security-appliances","b2b_product-siem","b2b_product-threat-intelligence"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Enterprise SIEMs Miss 76 Percent of MITRE ATT&amp;CK Techniques<\/title>\n<meta name=\"description\" content=\"Most SIEM systems are missing the vast majority of MITRE ATT&amp;CK techniques. Here&#039;s what to do about it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/siem-mitre-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Enterprise SIEMs Miss 76 Percent of MITRE ATT&amp;CK Techniques\" \/>\n<meta property=\"og:description\" content=\"Most SIEM systems are missing the vast majority of MITRE ATT&amp;CK techniques. Here&#039;s what to do about it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/siem-mitre-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-27T17:32:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-17T00:36:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/esp-siem-mitre-attack.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"945\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeff Goldman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Goldman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/siem-mitre-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/siem-mitre-attack\/\"},\"author\":{\"name\":\"Jeff Goldman\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\"},\"headline\":\"Enterprise SIEMs Miss 76 Percent of MITRE ATT&amp;CK Techniques\",\"datePublished\":\"2023-06-27T17:32:53+00:00\",\"dateModified\":\"2023-10-17T00:36:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/siem-mitre-attack\/\"},\"wordCount\":693,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/siem-mitre-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/esp-siem-mitre-attack.png\",\"keywords\":[\"cloud security\",\"container security\",\"cybersecurity\",\"network security\",\"security\",\"SIEM\"],\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/siem-mitre-attack\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/siem-mitre-attack\/\",\"name\":\"Enterprise SIEMs Miss 76 Percent of MITRE ATT&CK Techniques\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/siem-mitre-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/siem-mitre-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/esp-siem-mitre-attack.png\",\"datePublished\":\"2023-06-27T17:32:53+00:00\",\"dateModified\":\"2023-10-17T00:36:22+00:00\",\"description\":\"Most SIEM systems are missing the vast majority of MITRE ATT&CK techniques. Here's what to do about it.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/siem-mitre-attack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/siem-mitre-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/siem-mitre-attack\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/esp-siem-mitre-attack.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/esp-siem-mitre-attack.png\",\"width\":1400,\"height\":945,\"caption\":\"Abstract background concept of cyber security and attack, system crash.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/siem-mitre-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Enterprise SIEMs Miss 76 Percent of MITRE ATT&amp;CK Techniques\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\",\"name\":\"Jeff Goldman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"caption\":\"Jeff Goldman\"},\"description\":\"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Enterprise SIEMs Miss 76 Percent of MITRE ATT&CK Techniques","description":"Most SIEM systems are missing the vast majority of MITRE ATT&CK techniques. Here's what to do about it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/siem-mitre-attack\/","og_locale":"en_US","og_type":"article","og_title":"Enterprise SIEMs Miss 76 Percent of MITRE ATT&CK Techniques","og_description":"Most SIEM systems are missing the vast majority of MITRE ATT&CK techniques. Here's what to do about it.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/siem-mitre-attack\/","og_site_name":"eSecurity Planet","article_published_time":"2023-06-27T17:32:53+00:00","article_modified_time":"2023-10-17T00:36:22+00:00","og_image":[{"width":1400,"height":945,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/esp-siem-mitre-attack.png","type":"image\/png"}],"author":"Jeff Goldman","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Goldman","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/siem-mitre-attack\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/siem-mitre-attack\/"},"author":{"name":"Jeff Goldman","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795"},"headline":"Enterprise SIEMs Miss 76 Percent of MITRE ATT&amp;CK Techniques","datePublished":"2023-06-27T17:32:53+00:00","dateModified":"2023-10-17T00:36:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/siem-mitre-attack\/"},"wordCount":693,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/siem-mitre-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/esp-siem-mitre-attack.png","keywords":["cloud security","container security","cybersecurity","network security","security","SIEM"],"articleSection":["Networks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/siem-mitre-attack\/","url":"https:\/\/www.esecurityplanet.com\/networks\/siem-mitre-attack\/","name":"Enterprise SIEMs Miss 76 Percent of MITRE ATT&CK Techniques","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/siem-mitre-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/siem-mitre-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/esp-siem-mitre-attack.png","datePublished":"2023-06-27T17:32:53+00:00","dateModified":"2023-10-17T00:36:22+00:00","description":"Most SIEM systems are missing the vast majority of MITRE ATT&CK techniques. Here's what to do about it.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/siem-mitre-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/siem-mitre-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/networks\/siem-mitre-attack\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/esp-siem-mitre-attack.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/06\/esp-siem-mitre-attack.png","width":1400,"height":945,"caption":"Abstract background concept of cyber security and attack, system crash."},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/siem-mitre-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Enterprise SIEMs Miss 76 Percent of MITRE ATT&amp;CK Techniques"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795","name":"Jeff Goldman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","caption":"Jeff Goldman"},"description":"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.","url":"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/30861"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=30861"}],"version-history":[{"count":2,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/30861\/revisions"}],"predecessor-version":[{"id":32445,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/30861\/revisions\/32445"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/30863"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=30861"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=30861"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=30861"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=30861"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=30861"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=30861"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}