Defense improvement process
Now that we are all purple teamers and we understand how to gather Cyber Threat Intelligence (CTI), we need to determine which actions need to be prioritized and implemented after our assessments and exercises.
Just like in all processes, the execution itself is not the hardest part; it's usually the last bit, which, in general, is the one that brings the overall added value to any organization, that is most difficult. This is the case for purple teaming and we will see how to address this step and what controls and frameworks exist out there to help us.
As briefly discussed in Chapter 3, Carrying out Adversary Emulation with CTI, MITRE ATT&CK has been a real game-changer within the industry to allow people from both the red and the blue teams to better cooperate. Just like all frameworks, it is not perfect nor exhaustive, even though MITRE is continuously producing new content. However, it has become the common language for security experts...