Exposure Management
3 Min

The Power of MITRE SoT and Threat Surface Management in Supply Chain Security

CISOs worldwide are on a mission to prioritize supply chain security to ensure their organization's overall cybersecurity posture remains strong. Supply chain security is a critical aspect of cybersecurity for organizations that work with external vendors or suppliers. A comprehensive third-party risk management program is necessary to assess and mitigate the potential risks associated with these relationships. This includes evaluating vendor cybersecurity controls using frameworks like the MITRE System of Trust and ongoing vendor threat surface management to identify and remediate any vulnerabilities or threats.

Threat surface Management can complement the evaluation of cyber security controls assessed by the MITRE System of Trust (SoT). The MITRE SoT evaluates the trustworthiness of software and hardware components from a cybersecurity perspective and provides a comprehensive set of criteria and evaluation methods for assessing the security, reliability, and resilience of technology products. On the other hand, threat surface monitoring continuously monitors an organization's attack surface to identify and assess potential vulnerabilities and threats.

By combining the MITRE SoT with vendor threat surface management, organizations can gain a more comprehensive view of their cybersecurity posture. Threat surface monitoring can help identify new vulnerabilities or threats that may arise after evaluating cybersecurity controls and provide continuous feedback to the organization. This enables the organization to take action to remediate new vulnerabilities or threats as they emerge, improving its overall security posture.

Related posts

BLOG
Exposure Management

Email Security Controls: Levels of Security & Preventable Attack Scenarios

Over the last few weeks, we have received numerous support requests from our enterprise customers and had interactions with teams regarding early notification alerts sent from our side about their application servers' susceptibility to the HTTP 2 Rapid Reset DDoS attack. It was interesting to listen to the Blue team's stance and views on the shared responsibility aspect of DDoS mitigation. There is a widespread misbelief that any single-layer protection, whether at the ISP level or gateway, offers adequate defense against all types of DDoS attacks. Most large enterprises have multi-disciplinary, defense-in-depth practices in place to prevent such attacks. Nonetheless, it was notable that we were able to demonstrate the actual impact to customers with meaningful proof of concepts (POCs) despite the presence of many such security solutions. While the most favored and recommended method of remediation is the actual patching of the application server, there may be issues related to application compatibility or other factors that could delay this action. Therefore, it is crucial to verify the presence and effectiveness of security controls at various levels to establish a virtual patching defense for the affected application servers. A multi-layered DDoS defense strategy integrates measures from ISPs, WAFs/WAAPs, CDNs, ALBs, SLBs, and Application Servers to provide comprehensive protection

See NST Assure in action! Contact us for a Demo

email us : info@nstcyber.ai
Proactively predict, validate & mitigate risks