DE1.5 Severity Classification and MITRE ATT&CK Mapping

2-3 hours · Module 1 · Free
Operational Objective
The Severity Decision: Severity determines triage priority — a Critical alert interrupts whatever the analyst is doing, while a Low alert waits for the daily review. Assigning severity arbitrarily (defaulting everything to Medium) defeats the purpose of the SOC queue. MITRE ATT&CK mapping determines coverage reporting — a rule without a technique mapping is invisible to the coverage assessment. This subsection teaches the severity assignment methodology based on confidence and impact, and ATT&CK mapping at sub-technique precision.
Deliverable: A repeatable severity assignment framework and MITRE ATT&CK mapping methodology applicable to every detection rule you build.
⏱ Estimated completion: 25 minutes

Severity is not subjective

Severity determines SOC behavior. The analyst’s triage process is severity-driven: Critical alerts are investigated immediately — the analyst stops their current work. High alerts are triaged within 15 minutes during business hours. Medium alerts are triaged when the queue permits — typically within 1-2 hours. Low alerts are batch-reviewed in the daily security summary.

If every alert is Medium, the analyst treats them all with the same urgency — which means none of them receive the urgency that actual high-priority threats deserve. If Critical is over-assigned (more than 3-5 rules), the analyst experiences alert fatigue specifically on Critical alerts, which is the most dangerous form of desensitization.

Severity is determined by two dimensions: detection confidence (how likely is this alert a true positive?) and business impact (if this is a true positive and goes unaddressed, how bad is the outcome?).

SEVERITY ASSIGNMENT MATRIX — CONFIDENCE × IMPACTModerate ImpactSignificant ImpactCatastrophic ImpactHigh Confidence(TP rate >80%)MEDIUMe.g., inbox rule from risky sessionHIGHe.g., AiTM token theft detectedCRITICALe.g., vssadmin shadow deleteMedium Confidence(TP rate 50-80%)LOWe.g., anomalous sign-in propertiesMEDIUMe.g., PIM activation off-hoursHIGHe.g., bulk SharePoint downloadLow Confidence(TP rate<50%)INFORMATIONALe.g., new app registrationLOWe.g., first-time access to resourceMEDIUMe.g., CA policy disabled

Figure DE1.5 — Severity assignment matrix. Two dimensions determine severity: how confident is the detection (TP rate), and how bad is the outcome if it is real and missed. NE-specific examples at each intersection.

Applying the matrix to Northgate Engineering

Critical (reserve for 3-5 rules): vssadmin shadow copy deletion from a non-admin process (high confidence — almost always malicious; catastrophic impact — ransomware encryption in progress). LSASS memory access by a non-system process (high confidence — known credential dump technique; catastrophic impact — attacker gains domain credentials). These rules justify NRT deployment (DE1.6) and automated response (DE1.10).

High (10-15 rules): AiTM session token theft (high confidence once the session anomaly pattern is confirmed; significant impact — attacker has full mailbox and app access). RDP to a domain controller from a non-admin user (high confidence — field engineers do not RDP to DCs; significant impact — potential domain compromise). PIM Global Admin activation outside business hours (medium confidence — could be legitimate emergency; catastrophic impact — Global Admin can do anything).

Medium (15-25 rules): Suspicious inbox rule creation from a risky session (high confidence if correlated with identity risk; moderate impact — persistence, not immediate damage). Bulk SharePoint file download by a user who normally downloads fewer than 10 files per day (medium confidence — could be a legitimate project; significant impact if exfiltration). New conditional access policy modification (medium confidence — could be authorized IT change; significant impact if it creates an exposure window like CHAIN-DRIFT).

Low (10-15 rules): First-time access to a sensitive SharePoint site (low confidence — likely legitimate; moderate impact). New Entra ID app registration (low confidence — developers register apps routinely; moderate impact if malicious permissions). Anomalous sign-in properties without additional risk signals (low confidence — travel, VPN, device change all produce this).

MITRE ATT&CK mapping at sub-technique level

Every detection rule must map to at least one ATT&CK technique. The mapping serves two critical purposes: it connects the rule to the coverage assessment (DE2 measures coverage as distinct techniques detected / total relevant techniques), and it provides the SOC analyst with kill-chain context during triage.

Map at the sub-technique level when possible. The difference matters for coverage measurement. If you have 5 rules all mapped to T1059 (Command and Scripting Interpreter), your coverage assessment shows 1 technique covered. If those 5 rules are mapped to T1059.001 (PowerShell), T1059.003 (Windows Command Shell), T1059.005 (Visual Basic), T1059.006 (Python), and T1059.007 (JavaScript), your coverage shows 5 sub-techniques covered — a more accurate representation of your detection breadth.

In the Sentinel analytics rule configuration, MITRE ATT&CK mapping is set under the “Tactics and Techniques” section. Select the tactic first (e.g., Initial Access), then the technique (e.g., T1566 Phishing), then the sub-technique if applicable (e.g., T1566.002 Spearphishing Link). Multiple mappings are supported — a rule that detects inbox rule creation from a compromised session maps to both T1137.005 (Outlook Rules — Persistence) and the initial credential access technique that enabled the session compromise.

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
// COVERAGE VERIFICATION: List all rules with ATT&CK mappings
SecurityAlert
| where TimeGenerated > ago(90d)
| where ProviderName == "ASI Scheduled Alerts"
| extend Techniques = tostring(parse_json(ExtendedProperties).["Techniques"])
| extend Tactics = tostring(parse_json(ExtendedProperties).["Tactics"])
| summarize
    AlertCount = count(),
    LatestAlert = max(TimeGenerated)
    by AlertName, Techniques, Tactics
| where isnotempty(Techniques)
| sort by Tactics asc, Techniques asc
// Rules with empty Techniques field are unmapped  detection coverage blind spots

The ATT&CK Navigator (attack.mitre.org/matrices/enterprise/) accepts JSON layer files that visualize your coverage. DE10 teaches how to generate Navigator layers automatically from your Sentinel analytics rules — producing the heatmap visualization for the quarterly report.

⚠ Compliance Myth: "MITRE ATT&CK mapping is for compliance reports — it does not affect detection quality"

The myth: ATT&CK mapping is a documentation exercise for auditors and security framework compliance. It adds no operational value to the detection rule itself.

The reality: Without ATT&CK mapping, you cannot measure coverage. Without coverage measurement, you cannot identify gaps. Without gap identification, you cannot prioritize the detection backlog. The entire detection engineering program — from threat modeling (DE2) through coverage reporting (DE10) to the capstone board report (DE11) — depends on ATT&CK mapping. Remove it and the program becomes an unstructured collection of rules with no way to answer “what can we detect?” or “what are we missing?” Additionally, ATT&CK mapping provides triage context: an alert tagged T1550.002 (Pass the Hash) tells the analyst they are looking at a lateral movement attempt via credential reuse — directing the investigation toward source IP analysis and NTLM authentication anomalies, not toward email or application-layer investigation.

The severity-frequency connection

Severity and query frequency should align. A Critical severity rule should run at NRT or 5-minute frequency — if the alert is critical enough to interrupt the analyst immediately, it should be detected as fast as possible. A Low severity rule that runs at 5-minute frequency wastes compute on detections that will not be triaged for hours regardless of when they fire.

SeverityRecommended FrequencySOC Triage TargetNE Rule Count
CriticalNRT or 5 minImmediate3-5
High5-15 minWithin 15 min10-15
Medium30 min - 4 hrWithin 2 hours15-25
Low12-24 hrDaily review10-15

Northgate Engineering’s current state: all 23 rules run at default frequency (mostly 5 hours for templates) with mostly Medium severity. The detection engineering program will redistribute: Critical and High rules get faster frequencies, Low rules get slower frequencies, and the total compute budget stays approximately constant while detection latency improves for the rules that matter most.

Try it yourself

Exercise: Audit severity assignments on your rules

Open Sentinel → Analytics → Active rules. Sort by severity. How many rules are at each severity level? If most rules are Medium, the severity assignment is likely arbitrary — defaulted during creation and never reassessed. For each rule, evaluate: what is the confidence (estimated TP rate)? What is the impact if it is a TP and goes unaddressed? Apply the matrix. Would any rules change severity?

Then check ATT&CK mapping: how many rules have technique mappings? How many are mapped at the sub-technique level? Rules without mappings are invisible to coverage reporting.

Check your understanding

A detection rule identifies a user signing in from a new country for the first time, during off-hours. The detection confidence is medium (could be legitimate travel or a compromised account). The impact if it is a real compromise is high (full account access including email, SharePoint, Teams). What severity should you assign, and what frequency should the rule run at?

Answer: Medium severity (medium confidence × significant/high impact = Medium per the matrix). The rule should run at 30-minute to 1-hour frequency — matching Medium severity's triage target of "within 2 hours." Not 5-minute frequency (the detection does not require immediate response — the analyst investigates to determine if it is travel or compromise). Not 12-hour frequency (if it IS a compromise, 12 hours of undetected access is too long for a high-impact scenario). If additional signals correlate with the alert during investigation (e.g., inbox rule creation, bulk file download), the incident severity can be escalated to High during triage.

Decision: Should this detection be Critical severity?

You have built a detection rule for PIM Global Admin activation. Global Admin can modify any setting in the tenant. Activation occurs 2-3 times per month legitimately (emergency access scenarios).
Is the detection confidence high enough for Critical?

Troubleshooting: Severity and mapping issues

“All our rules are Medium severity.” This is the most common severity anti-pattern. It means severity was defaulted during creation and never reassessed. Conduct a one-time severity audit: for each rule, apply the confidence × impact matrix. Reassign severities. Then establish the practice: every new rule’s severity is justified in the specification (section 8 — Severity + Rationale). No rule ships at Medium without an explicit rationale.

“Our rules have ATT&CK tactic mappings but not technique mappings.” Tactic-only mapping (e.g., “Initial Access” without specifying T1566.002) is too coarse for coverage measurement. Two rules both mapped to “Initial Access” could detect the same technique or different techniques — you cannot tell without technique-level mapping. Open each rule and add the specific technique ID. The Sentinel UI provides a searchable technique picker.

“We mapped techniques but the coverage report shows lower coverage than expected.” Check for duplicate technique coverage — multiple rules detecting the same technique count as coverage for ONE technique. The coverage metric is distinct techniques, not rule count. Also verify that the technique is relevant to your environment. Covering T1200 (Hardware Additions) is not meaningful if your threat model does not include physical access attacks.


References used in this subsection

  • MITRE ATT&CK Enterprise Matrix v15 (attack.mitre.org)
  • Course cross-references: DE1.3 (frequency selection by severity), DE1.6 (NRT for Critical detections), DE2 (coverage assessment using ATT&CK mapping), DE10 (ATT&CK Navigator layer generation)

You're reading the free modules of Detection Engineering

The full course continues with advanced topics, production detection rules, worked investigation scenarios, and deployable artifacts. Premium subscribers get access to all courses.

View Pricing See Full Syllabus