MITRE ATT&CK — Adversarial Tactics, Techniques, and Common Knowledge

SmartSuite provides the system for managing controls, evidence, mappings, assessments, and reporting. Framework text may require a separate license unless explicitly provided.
Overview
MITRE ATT&CK is a globally-accessible knowledge base of adversary tactics, techniques, and procedures (TTPs) based on real-world cyber attack observations. The framework provides a common taxonomy for describing how adversaries operate, enabling organizations to improve threat detection, prevention, and response capabilities.
Developed and maintained by MITR Corporation, ATT&CK is widely used by security teams, threat intelligence analysts, red teams, and defenders across government, commercial, and academic sectors. It covers tactics and techniques across Enterprise (Windows, macOS, Linux, cloud, network), Mobile, and ICS environments.
Organizations use MITRE ATT&CK for threat intelligence enrichment, security control gap analysis, red team planning, detection engineering, and communicating about adversary behavior in a standardized way. The framework is free and publicly available.
Why it Matters
MITRE ATT&CK provides a comprehensive, empirically-grounded model of adversary behavior enabling organizations to systematically improve their detection and defense capabilities.
Key benefits include:
- Strengthen threat-informed defense
Align security investments with real-world adversary techniques targeting your sector and systems.
- Improve detection engineering
Map detection capabilities to ATT&CK techniques, identifying gaps and prioritizing detection development.
- Enhance threat intelligence
Enrich threat intelligence with structured technique context enabling actionable defensive improvements.
- Support red team and purple team activities
Use ATT&CK as a common language for adversary simulation and collaborative security testing.
- Enable security control assessment
Evaluate security controls against ATT&CK technique coverage to identify defensive gaps.
How it Works
MITRE ATT&CK is organized into matrices covering Enterprise, Mobile, and ICS environments. Each matrix contains tactics (adversary objectives) and techniques (how objectives are achieved). Techniques include sub-techniques, detection guidance, mitigation recommendations, and real-world procedure examples from observed adversary groups and software.
Organizations use ATT&CK by mapping observed threats and intelligence to techniques, assessing control coverage against technique matrices, developing detection rules targeting high-priority techniques, and using ATT&CK Navigator to visualize coverage and gaps.
Within SmartSuite, security teams track ATT&CK technique coverage, manage detection development priorities, link threat intelligence to framework techniques, and maintain evidence supporting security control effectiveness assessments.
Key Elements
- Tactics and Techniques Matrix
Organizes adversary behavior into tactical objectives and specific techniques with real-world examples.
- Threat Actor Profiles
Documents known adversary groups with associated TTPs enabling targeted defensive prioritization.
- Mitigation Guidance
Provides defensive recommendations for each technique supporting control implementation decisions.
- Detection Guidance
Offers data sources and detection approaches for identifying technique execution.
- ATT&CK Navigator
Provides visualization tooling for mapping coverage, priorities, and threat actor overlays.
Framework Scope
MITRE ATT&CK applies to organizations across all sectors using it for threat intelligence, detection engineering, red teaming, and security control assessment. Matrices cover Enterprise IT, cloud, mobile, and industrial control system environments.
Framework Objectives
MITRE ATT&CK provides a comprehensive adversary behavior knowledge base enabling threat-informed defense and security improvement.
- Document real-world adversary techniques enabling systematic defensive improvement
- Provide common language for communicating about threats across security teams
- Enable security control gap analysis against empirical threat behavior
- Support threat intelligence enrichment and sharing with structured context
- Facilitate red team and detection engineering activities
MITRE ATT&CK integrates with CIS Controls, NIST SP 800-53, and D3FEND. Security teams implement it for threat intelligence programs, detection engineering, control assessments, and adversary simulation activities.
Common Framework Mappings
Mapped frameworks include:
CIS Critical Security Controls
D3FEND
IEC 62443
NIST Cybersecurity Framework
NIST SP 800-53
OWASP Top Ten
SOC 2
- ClassicifationCategoryCybersecurityDomainCybersecurityFramework FamilyMITRE ATT&CK
- Regulatory ContextTypeStandardSectorCross-SectorIndustryCross-Industry
- Region / PublisherRegionGlobalRegion DetailUnited StatesPublisherMITRE Corporation
- VersioningVersionATT&CK v10Effective Date2015Issue Date2013
- AdoptionAdoption ModelOperational SecurityImplementation ComplexityModerate
- Official ReferenceOpen Link in New TabSource
License included / downloadable: Yes
MITRE ATT&CK is publicly available and maintained by MITRE Corporation as an open knowledge base.
How SmartSuite Supports MITRE ATT&CK 10
Centralize controls, evidence, and audit workflows to stay continuously SOC 2–ready.
ATT&CK Technique Coverage Map
Track coverage by tactic/technique and identify detection and control gaps.
Detection Engineering Backlog
Manage detection workstreams with owners, priorities, and implementation status.
Test Plans and Validation Evidence
Store purple-team results, simulations, and validation proof tied to techniques.
Incident Response Playbooks
Link playbooks and response tasks to ATT&CK behaviors for consistent handling.
Exceptions and Risk Acceptance
Document gaps, compensating controls, approvals, and timelines to close coverage.
Executive Threat Detection Reporting
Report detection maturity and coverage trends by tactic, technique, and team.
Frequently Asked Questions For MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge)
MITRE ATT&CK is used to document and analyze adversary tactics, techniques, and procedures observed in real-world cyber attacks. Organizations use it to inform threat detection, enhance incident response, and evaluate the effectiveness of security controls against known attacker behaviors.
MITRE ATT&CK is not a certifiable standard and is not mandated by regulatory bodies. It is a freely available knowledge framework adopted voluntarily to strengthen cybersecurity practices and improve threat-informed defense initiatives.
The MITRE ATT&CK framework is suitable for security teams, threat intelligence analysts, SOC operators, and compliance professionals across all industry sectors. Its scope covers a comprehensive range of adversary behaviors, tactics, and techniques applicable throughout the cyber attack lifecycle.
Key components of MITRE ATT&CK include a matrix of tactics (attacker goals), techniques (methods to achieve those goals), and procedures (specific implementations observed in the wild). The framework also contains mappings to threat actor profiles and specific incidents, facilitating detailed threat intelligence analysis.
Organizations implement MITRE ATT&CK by mapping internal security controls and monitoring activities to specific ATT&CK techniques. This includes developing detection analytics, documenting coverage, and aligning incident response procedures with the framework to address identified gaps.
MITRE ATT&CK complements other cybersecurity frameworks such as the NIST Cybersecurity Framework and ISO 27001 by providing concrete examples of attacker actions. It is often used alongside these frameworks to inform risk assessments, threat modeling, and control selection.
Effective use of MITRE ATT&CK requires ongoing mapping of new threats, regular review of security control effectiveness, and continuous updating of threat intelligence sources. Organizations should ensure their coverage remains current as attacker tactics and techniques evolve.
SmartSuite supports MITRE ATT&CK by providing mapped security control libraries, centralized risk and threat registers, and policy governance tools. Organizations can collect and document evidence of ATT&CK technique coverage, manage remediation workflows, maintain audit readiness, and generate detailed reports on threat monitoring and compliance status.
Put CRI Profile into action with SmartSuite
Map controls, collect evidence, run assessments, manage remediation, and report readiness - all from a single connected system.
