CybersecurityOffensive Security

MITRE ATT&CK

Overview

Direct Answer

MITRE ATT&CK is a comprehensive, publicly accessible knowledge base that documents adversary tactics, techniques, and procedures (TTPs) derived from analysis of real-world cyber attacks and threat intelligence. It serves as a foundational framework for understanding how attackers operate across various platforms and environments.

How It Works

The framework organises adversary behaviour into a hierarchical structure: tactics represent the high-level objectives attackers pursue (e.g. initial access, persistence, exfiltration), whilst techniques describe the specific methods used to achieve those objectives. Each technique entry includes documented examples, mitigation strategies, and detection approaches sourced from security research, incident response data, and threat reports contributed by the security community.

Why It Matters

Organisations utilise this framework to align defensive strategies with actual attacker behaviour, reducing risk prioritisation based on speculation. Security teams reference it for threat modelling, red team exercises, and defensive architecture design, whilst compliance and audit functions use it to benchmark detection and response capabilities against industry-recognised adversary patterns.

Common Applications

Security operations centres employ it to structure incident response procedures and threat hunting activities. Penetration testers and red teams reference technique documentation to simulate realistic attack scenarios. Vendors integrate its taxonomy into endpoint detection platforms and security information and event management solutions to categorise alerts and threats.

Key Considerations

The framework represents observed behaviour but cannot capture all adversary innovations, and not all documented techniques are equally prevalent or impactful across all organisations. Regular updates are necessary to maintain alignment with evolving threat landscapes.

More in Cybersecurity