#D3FEND

CyberNetsecIOnetsecio
2025-12-17

📰 MITRE Extends D3FEND Cybersecurity Framework to Operational Technology (OT)

MITRE has extended its D3FEND framework to Operational Technology (OT)! 🛡️ Funded by the NSA, the new knowledge base provides a standard for defending critical infrastructure and cyber-physical systems. 🏭

🔗 cyber.netsecops.io/articles/mi

2025-01-28

I missed this but wow, MITRE D3FEND announced their 1.0 release. Big milestone for them
#MITRE #D3FEND #ThreatIntel
d3fend.mitre.org/blog/d3fend-1

st1nger :unverified: 🏴‍☠️ :linux: :freebsd:st1nger@infosec.exchange
2025-01-20

#D3FEND - A knowledge graph of #cybersecurity countermeasures d3fend.mitre.org/

2023-11-23

ATT&CK Workbench is an impressive piece of software for #threatintel, the missing piece to actually make the topologies usable.

mitre-engenuity.org/cybersecur

I hope a #D3FEND integration will be available in the future.

2023-07-20

@shellsharks So my team has been thinking of a few ways of mapping controls to TTPs. Best route for now seems to take our Single Process Inventory (SPI) and find correlating controls in place.
Then using MITRE D3FEND, take ATT&CK techniques in our reporting and map to D3FEND techniques that make logical sense for us to implement. Ex. T1134 - Access Token Manipulation has some D3FEND techniques like System Call Analysis, Process Spawn Analysis, Mandatory Access Control.
d3fend.mitre.org/offensive-tec

NIST 800-53 Rev. 5 also includes a spreadsheet for mapping controls to TTPs although it's kept very vague. They do include a Navigator layer which can be useful to overlay with whatever ATT&CK techniques you're focused on.

mitre-engenuity.org/cybersecur
#ThreatIntel #MITRE #D3FEND

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst