#
Glossary
#
Detection Levels Definitions
- Full
- Logging, detection, or alerts were observed during the test.
- None
- Logging, detection, or alerts were not observed during the test.
- Partial
- Logging, detection, or alerts were only generated for a subset of the environment or unit test variations.
- Untested
- The unit test has not been performed.
#
Visibility Levels Definitions
- Logged
- Logs are records of events. They often include network, application, database, and endpoint events. Without proper logging, detections and alerts cannot be created for incident response teams.
- Detected
- Refers to any event that has been identified as anomalous or possible malicious behavior. However, some detections may not generate an alert or response.
- Alerted
- Refers to any event that has been identified as malicious and requires triage from the incident response team based on criteria defined by the security operations runbooks.
- Responded
- Refers to the ticket or email generated by an alert that triggers the incident repsonse team to begin triaging the event.
- Prevented
- To what degree did the controls prevent potentially malicious behaviors/events from occurring based on detections.
#
Miscellaneous A-Z Definitions
- Accepted Risk
- A finding can be marked as an "Accepted Risk" and will no longer appear as a threat in need of remediation.
- Agent
- NetSPI's Breach and Attack Simulation agent is a non-persistent piece of software that runs in-memory. It is used to run the plays and playbooks.
- Alerted
- An alert refers to any event that has been identified as malicious and requires triage from the incident response team based on criteria defined by the security operations runbooks.
- Default Operation
- By default, an operation called "All Procedures" is created. This operation contains all current, as well as future, procedures.
- Detected
- A detection refers to any event that has been identified as anomalous or possible malicious behavior. However, some detections may not generate an alert or response.
- Heatmap
- The heatmap dashboard is designed to present the tactics, techniques, and procedures associated with your operation in the context of a more traditional MITRE ATT&CK heatmap format.
- Logged
- Logs are records of events. They often include network, application, database, and endpoint events. Without proper logging, detections and alerts cannot be created for incident response teams.
- Malware
- Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system or network.
- Operation
- Operations define the scope of plays, playbooks, and the agents they run on. They also define the scope of the detective control coverage tracking.
- Play
- Automation for a specific manual procedure.
- Playbook
- A collection of plays that can be executed in a predefined order to simulate threats.
- Prevented
- To what degree did the controls prevent potentially malicious behaviors/events from occurring based on detections.
- Procedure
- This refers to the sequence of actions performed to execute a technique. The procedure involves detailed descriptions of the procedure, manual attack instructions, detection and prevention recommendations, other educational content and references.
- Responded
- This refers to the ticket or email generated by an alert that triggers the incident response team to begin triaging the event.
- Tactic
- The threat actor's intended goal and reason for performing an action.
- Technique
- The broad description of how a threat actor accomplishes their goal.
- Threat Actor
- An individual or group that intentionally cause harm to digital devices or systems.
- Timeline
- The timeline dashboard is designed to help you track your detective control coverage for an operation over time. Here you can see where you have gotten better and worse.
- Workspace
- The workspace is designed to provide insights into your current detective control coverage. It helps you learn about, test, measure, and track all the tactics, techniques, and procedures associated with your operation.