8.4 Remediation Framework Mapping

8.4 Remediation Framework Mapping

What you're building: A structured mapping that helps your client justify security budget by connecting your findings to the compliance and regulatory frameworks their board already cares about.

Map findings to MITRE ATT&CK, NIST CSF, and CIS Controls for structured remediation guidance.

Technique: Control & Mitigation Correlation

Tools/Templates: MITRE ATT&CK, CIS Controls v8, NIST CSF 2.0

Procedure:

### Remediation Mapping Table
| Finding | MITRE Technique | CIS Safeguard | NIST CSF | Effort |
|---|---|---|---|---|
| ADCS ESC1 | T1649 | 4.1: Secure Config Process | ID.AM-3 | Medium |
| Kerberoasting | T1558.003 | 5.2: Unique Passwords | PR.AC-1 | Low |
| LLMNR Poisoning | T1557.001 | 4.1: Disable LLMNR/NBT-NS | PR.AT-2 | Low |
| SQL Injection | T1190 | 16.11: Secure Coding | PR.IP-2 | High |
| Weak IAM | T1078.004 | 6.8: Define and Maintain Role Based Access | PR.AC-4 | Medium |
| SMB Signing Off | T1187 | 3.10: Encrypt Sensitive Data in Transit | PR.DS-2 | Low |

Remediation Roadmap

  1. Immediate (0–30 days): Disable LLMNR/NBT-NS, enforce SMB signing, patch ADCS templates, enforce IMDSv2.
  2. Short-term (30–90 days): Implement MFA on all external services, rotate service account passwords, audit IAM roles, deploy endpoint detection.
  3. Long-term (90+ days): Move to zero-trust architecture, implement tiered admin model, deploy ADCS auditing (Event IDs 4886/4887), conduct purple team exercise to validate detection improvements.

Prioritization Matrix

NOTE: Mapping to frameworks helps the client justify budget by showing how your findings align with industry standards and regulatory requirements (SOC 2, ISO 27001, DORA, NIS2). Clients with compliance obligations respond better to "this violates CIS Control 5.2" than "this is a weak password."


Part of Pillar 8: Reporting & Portfolio Development.