UUSE CSE CAASE GUSE GUIIDDEE Know an attacker’s next move by ServiceNow Security ® Operations allows mapping incidents to MITRE ATT&CK you to combine Security teams have historically found internalizing an adversary’s intent a challenge SOAR and MITRE when dealing with security incidents and may incorrectly prioritize security incidents ATT&CK to add without this insight. MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) documents and tracks various adversarial techniques that are used during business, asset, different stages of a cyberattack. By integrating the MITRE ATT&CK knowledge base risk, and threat with ServiceNow Security Incident Response, organizations can more quickly identify threats and anticipate cyberattack responses. This framework helps security analysts context to your align events and IoCs with the tactics and techniques used by adversaries and attack security automation campaigns. Operationalizing security response and orchestration. ServiceNow Security Operations allows you to combine SOAR and MITRE ATT&CK The combination to add business, asset, risk, and threat context to your security automation and delivers an orchestration. The combination delivers an incident response platform and threat incident response intelligence to help you respond fast and efficiently, enabling you to move beyond point tools to operationalize security response. platform and threat intelligence to help you respond fast and efficiently, enabling you to move beyond point tools to operationalize security response. Whenever a security incident is created from an alert, details from all data sources, including third-party products like SIEM, sandbox, and TIPs, are forwarded to ServiceNow Security Operations, which also gathers all information related to MITRE ATT&CK tactics and techniques. These tactics and techniques are then mapped to a MITRE ATT&CK card. This allows analysts to better understand where individual security events fit into an overall attack. ServiceNow also can ingest MITRE ATT&CK data from third-party products like SIEM or threat intelligence feeds. Similar to GPS tracking Beyond associating specific security incidents with MITRE tactics and techniques, security analysts can use the ServiceNow ATT&CK Navigator to pivot across the MITRE ATT&CK Matrix and understand what likely happened before an individual security event and what’s likely to happen next. ServiceNow has enhanced the MITRE ATT&CK navigator with additional visualization features to help organizations understand the scope and relationships of different types of attacks and what to do next for response and containment. This is analogous to navigation using GPS tracking rather than depending upon a compass and celestial constellation. This sequencing alone can help accelerate security operations processes. 77

Security Operations - Page 7 Security Operations Page 6 Page 8