# Workspace

The Workspace provides insights into your current detective control coverage. It helps your analyst, purple team, or detection engineer will spend most of their time learn about, test, measure, and track all the tactics, techniques, and Procedures associated with your Operation.

Workspace
Workspace

As data populates the Workspace (see Procedure group and Procedure details, below), it updates the two summary charts in real time. These charts illustrate what coverage you have at each major visibility level and at each phase of the cyber kill chain. They also allows you to understand where there might be major breakdowns and prioritize remediation, update tools, and/or update staff.

# Overall Coverage Summary

The Overall Coverage Summary graph shows a breakdown of percentages or a count of your missed vs covered Procedures.

Overall Coverage Summary
Overall Coverage Summary

  • Select the hamburger menu to view the chart in full screen, print the chart, or download an image or CSV file of the graph.

Coverage Summary Context Menu
Coverage Summary Context Menu

  • Hover over any bar to put focus on the overall coverage summary by missed or covered procedures.

Coverage Focus
Coverage Focus

# Overall Coverage Summary by Tactic

Overall Coverage Summary by Tactic
Overall Coverage Summary by Tactic

The Overall Coverage Summary by Tactic graph shows your coverage in either percentage or count by tactic.

  • In the upper right-hand corner, you can select different graph views (bar, horizontal bar plot, scatter plot, and radar).

Graph Toggle
Graph Toggle

  • Select the hamburger menu to view the chart in full screen, print the chart, or download an image or CSV file of the graph.

  • Hover over any bar to put focus on a specific status for all the tactics.

Summary by Tactic focus
Summary by Tactic focus

# Procedure group table (lower left quadrant)

The Procedure group table displays procedures grouped by attack flow or MITRE attack tactics.

Procedure Table
Procedure Table

Here you can:

  • Export/download the procedures in any of the following formats: CSV, JSON, and PDF by selecting the export Export icon icon
  • Select the expand icon to the left of an individual procedure group to expand and display the individual procedures in the group.

Expanded Procedure Group
Expanded Procedure Group

# Procedure details group (lower right quadrant)

Use the following steps to access the Procedure details group.

  1. Select any row in the Procedure group table to display details for that procedure in the right lower quadrant of the page. It encompasses five tabs of organized procedure details: Visibility, Details, Activity Log, Files, and Tags.

    Procedure Group table with details

  2. Use the table controls in the top right corner to expand expand, contract contract, or close close the group.

    The information included in each tab is described below.

# Visibility tab

The Visibility tab provides data on a specific tactic (Persistence in the example below) with the specific procedure referenced below it.

Visibility Tab
Visibility Tab

You can mark the procedure as an acceptable risk, check the procedure level status, and view the procedure's data sources.

# Editing the Visibility tab options

You can edit the Visibility tab to update the accepted risk, detection levels, and data sources.

  1. Select the Edit icon in the upper right corner of the Visibility tab to enter edit mode.

  2. Make one or more of the following edits as needed:

    • Select or clear the Accepted Risk button to indicate a vulnerability can be marked as an "Accepted Risk" and will no longer appear as a threat in need of remediation.
    • Select the button beneath any/all of the Levels options to indicate to what degree you prefer a discovered vulnerability should be logged, detected, alerted, responded, or prevented.
    • Select the Add Row bar button in the Data Sources field group to add one or more data source details
    • Add a comment in the Comment field to document your editing choices, using the full text editor that supports text formatting, including code snippets, image uploads, links, tables, and timestamps.

  3. Select Save to save your changes.

# Details tab

The Details tab contains educational information on what the attack is, why it's meaningful, how to execute it manually, and how to develop detections for it.

Details Tab
Details Tab

It includes the name of the Procedure, the Detection Coverage levels and their statuses, description, business impact, verification instructions, references and tags associated with that Procedure.

# Activity Log tab

When you run a play the Activity Log tracks all your play executions. This tab shows a history of the selected Procedure. It also allows you to add and view comments.

Activity Log
Activity Log

  1. Select the BAS Comment icon to display a Comment field with rich text editing and support for adding links and uploading images.

    Activity Log Comment dialog box

  2. Once you complete entering your comment, select Post to close the field with your comment displayed.

# Files tab

The Files tab is where you upload files related to the procedure.

Files Tab
Files Tab

# Tags tab

The tags information supplied here tells you why you should care about this particular play. Types of tags that display here are grouped in to categories that are associated with the selected Procedure: Global, Threat Actor, and Tool and Malware.

Tags Tab
Tags Tab

The BAS module focuses on solid behavior-based test cases. In the example above, this play is known to be used by 31 threat actors and this is why you should care.