We Mapped 130 Iranian Cyber Attacks to CMMC… Here's What We Found
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
-
Narrated by:
-
By:
Iranian cyber actors are targeting the Defense Industrial Base.
So does CMMC actually help?
In this episode, we mapped 130 real-world techniques used by five Iranian threat groups to the controls behind NIST SP 800-171 using the MITRE ATT&CK framework.
Here is what the data shows:
• 100% of techniques are detectable
• 68% are mitigated with preventative controls
• Just a handful of core controls drive most of the defensive impact
We also examine what that means for Cybersecurity Maturity Model Certification and why 800-171 remains a strong floor for protecting CUI.
But there is a gap. Only about half of the relevant NIST SP 800-53 that mitigate known Iranian techniques are represented in the 800-171 baseline.
If you are a defense contractor, this episode will show you what compliance actually buys you and where you may need to go further.
Register for Summit 7 Live: https://www.summit7.us/s7live
MITRE ATT&CK: https://attack.mitre.org/
Mappings Explorer: https://ctid.mitre.org/projects/mappings-explorer
CISA Alert: https://www.cisa.gov/topics/cyber-threats-and-advisories/advanced-persistent-threats/iran
NIST SP 800-53: https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final
NIST SP 800-171: https://csrc.nist.gov/pubs/sp/800/171/r2/upd1/final