.MITRE ATT&CK framework models adversary behaviour reflecting adversary attack lifecycle. Cyber adversaries utilise common behaviour pattern that is captured in the framework in a structured and categorised method (TTP). 

The team at Proveho Networks leverage the MITRE ATT&CK framework to emulate adversary behaviour and red teaming activities that assess the effectiveness of existing defences and identifies

The framework is effective in assessing our clients defence posture, the effectiveness of security programs, strategy and roadmap.    

Proveho Networks leverages Defence-in-Depth principle aligning with reputable vendors and integrating relevant best practices to provide security assurance.
Our Approach

Defence in Depth security principle forms the foundation on which cyber security programs are developed and implemented. Inadequate security assessment and misalignment of security controls can result in a fragmented security program that lacks effectiveness in protecting digital assets and resources and inefficient in support operational objectives.

 

Proveho Networks aligns with industry standards and bodies, and reputable security vendors to uplift capability and provide optimal and effective security assurance to our clients’ business priorities.  Most common controls are across cloud services, datacentre and end-user computing environments. These include endpoint security with detection and response capability, Application aware firewalls, network micro segmentation, vulnerability management and system hardening, user security awareness training and incident management.