At Microsoft, we consistently collaborate with potentialities and the InfoSec community to be taught extra about the most novel adversary tradecraft so that we are in a position to beef up our detection methods all the design in which thru all our security services and products. Even though these detections are already built into our merchandise, and holding potentialities this day, we imagine it’s a long way extreme for security researchers to switch past indicators and detections to ticket the underlying assault behaviors and technical implementation of adversary methods. This also empowers others within the InfoSec community to larger acknowledge to investigations of connected attacks. To abet the broader security community with these efforts, we are releasing SimuLand.
What’s SimuLand?
SimuLand is an open-provide initiative by Microsoft to abet security researchers all the design in which thru the enviornment deploy lab environments that reproduce properly-known methods outmoded in real assault scenarios, actively test and verify the effectiveness of connected Microsoft 365 Defender, Azure Defender, and Azure Sentinel detections, and lengthen possibility examine the snarl of telemetry and forensic artifacts generated after every simulation snarl.
These lab environments will present snarl cases from quite loads of recordsdata sources alongside with telemetry from Microsoft 365 Defender security merchandise, Azure Defender, and different built-in data sources thru Azure Sentinel data connectors.
The motive slack SimuLand
As we maintain out the SimuLand framework and launch populating lab environments, we are in a position to be working under the following total principles:
- Understand the underlying habits and functionality of adversary tradecraft.
- Title mitigations and attacker paths by documenting preconditions for every attacker action.
- Expedite the maintain and deployment of possibility examine lab environments.
- Cease updated with the most novel methods and tools outmoded by real possibility actors.
- Title, doc, and part relevant data sources to model and detect adversary actions.
- Validate and tune detection capabilities.
Route of integration
Our design is to possess SimuLand built-in with possibility examine methodologies where dynamic prognosis is applied to total-to-end simulation scenarios. The image under reveals where SimuLand would match.
Figure 1: Diagram of possibility examine methodologies.
The enhance
The enhance of the undertaking is highly straightforward and damaged down in a modular system so that we are in a position to re-snarl and test about a mixtures of attacker actions with different lab atmosphere designs. To boot to, step-by-step lab guides are supplied to aggregate the total required documentation to no longer easiest attain the end-to-end simulation snarl nonetheless also prepare and deploy the lab atmosphere. This initiative stems from various open-provide initiatives corresponding to Azure Sentinel2Go and Blacksmith from the Originate Risk Learn (OTR) community.
The system to prepare
Nearly every atmosphere contributed thru this initiative requires as a minimal a Microsoft 365 E5 license (paid or trial) and an Azure tenant. Other deployment requirements are laid out within the lab guides.
The deployment direction of
Looking on the lab data being worked on, the maintain of the community environments would maybe also alternate a piece. Whereas some labs will replicate a hybrid coarse-area atmosphere (on-premises to cloud), others will level of interest easiest on sources within the cloud. Additionally, Azure Handy resource Manager (ARM) templates are supplied to expedite the deployment direction of and doc the infrastructure as code. The image under represents the primary atmosphere released this day.
Figure 2: Network atmosphere.
Simulate and detect
Every simulation conception supplied thru this undertaking is examine-basically based and damaged down into attacker actions mapped to the MITRE ATT&CK framework. The design of the simulate and detect element is to also summarize the primary steps outmoded by a possibility actor to derive a particular object and permit security researchers to derive familiarized with the attacker habits at a high level. As an illustration, the image under reveals about a of the methods one would maybe also export the token signing certificates from a federation server.
Figure 3: Example of exporting token signing certificates from federation server.
Plot up security indicators
In the destroy, from a defensive perspective, simulation steps shall be mapped to detection queries and indicators from Microsoft 365 Defender security merchandise, Azure Defender, and Azure Sentinel. That it’s doubtless you’ll snarl identical views be pleased the one under from the Microsoft 365 security portal to station up security indicators. We imagine this would abet data about a of the prolonged possibility examine generated from the simulation snarl.
Figure 4: Microsoft 365 Defender security portal.
You can even also snarl the Azure Sentinel investigation skills to aggregate indicators from Microsoft 365 defender and Azure Sentinel to present extra context.
Figure 5: Azure Sentinel investigation see.
Future work
Moreover constructing extra scenarios, we are also going to be working on quite loads of aspects to beef up the undertaking. The list under reveals about a of the solutions we at the moment possess:
- A data model to doc the simulation steps in a extra organized and standardized system.
- A CI/CD pipeline with Azure DevOps to deploy and preserve infrastructure.
- Automation of assault actions within the cloud by potential of Azure Capabilities.
- Capabilities to export and part telemetry generated with the InfoSec community.
- Microsoft Defender evaluate labs integration.
Neighborhood contributions
We see ahead to contributions and feedback from the community. In case you would maybe maybe desire to make contributions to particular areas of the undertaking, open an place in our GitHub repository and part your solutions. Take a see on the “Future Work” portion for some solutions.
Unusual end-to-end simulation scenarios
In case you would maybe maybe desire to part a brand original end-to-end attacker route, allow us to know by opening an place in our GitHub repository, and we will doubtless be jubilant to collaborate and present some sources to derive it happen. We’d then part the output with the community thru this undertaking after the most attention-grabbing validation and detection pattern direction of. Take into legend that simulation scenarios are no longer easiest per properly-known assault paths, nonetheless also the creativity of the researcher.
Extra detection queries
In case you maintain detection principles that would maybe also even be added to our simulate and detect portion, be happy to open an place and we are in a position to allow you to to make contributions to the decent Microsoft 365 Defender and Azure Sentinel detection repositories. We snarl queries without lengthen from these two sources in our documents.
Be taught extra
To be taught extra about this open-provide initiative, consult with the SimuLand GitHub repository.
To be taught extra about Microsoft Security suggestions, consult with our online web philosophize. Bookmark the Security blog to withhold with our expert coverage on security matters. Also, follow us at @MSFTSecurity for the most novel news and updates on cybersecurity.