Cybersecurity
DETAIL

MITRE ATT&CK — Adversarial Tactics, Techniques, and Common Knowledge

SmartSuite provides the system for managing controls, evidence, mappings, assessments, and reporting.
Framework text may require a separate license unless explicitly provided.

Overview

MITRE ATT&CK is a globally-accessible knowledge base of adversary tactics, techniques, and procedures (TTPs) based on real-world cyber attack observations. The framework provides a common taxonomy for describing how adversaries operate, enabling organizations to improve threat detection, prevention, and response capabilities.

Developed and maintained by MITR Corporation, ATT&CK is widely used by security teams, threat intelligence analysts, red teams, and defenders across government, commercial, and academic sectors. It covers tactics and techniques across Enterprise (Windows, macOS, Linux, cloud, network), Mobile, and ICS environments.

Organizations use MITRE ATT&CK for threat intelligence enrichment, security control gap analysis, red team planning, detection engineering, and communicating about adversary behavior in a standardized way. The framework is free and publicly available.

Why it Matters

MITRE ATT&CK provides a comprehensive, empirically-grounded model of adversary behavior enabling organizations to systematically improve their detection and defense capabilities.

Key benefits include:

  • Strengthen threat-informed defense

Align security investments with real-world adversary techniques targeting your sector and systems.

  • Improve detection engineering

Map detection capabilities to ATT&CK techniques, identifying gaps and prioritizing detection development.

  • Enhance threat intelligence

Enrich threat intelligence with structured technique context enabling actionable defensive improvements.

  • Support red team and purple team activities

Use ATT&CK as a common language for adversary simulation and collaborative security testing.

  • Enable security control assessment

Evaluate security controls against ATT&CK technique coverage to identify defensive gaps.

How it Works

MITRE ATT&CK is organized into matrices covering Enterprise, Mobile, and ICS environments. Each matrix contains tactics (adversary objectives) and techniques (how objectives are achieved). Techniques include sub-techniques, detection guidance, mitigation recommendations, and real-world procedure examples from observed adversary groups and software.

Organizations use ATT&CK by mapping observed threats and intelligence to techniques, assessing control coverage against technique matrices, developing detection rules targeting high-priority techniques, and using ATT&CK Navigator to visualize coverage and gaps.

Within SmartSuite, security teams track ATT&CK technique coverage, manage detection development priorities, link threat intelligence to framework techniques, and maintain evidence supporting security control effectiveness assessments.

Key Elements

  • Tactics and Techniques Matrix

Organizes adversary behavior into tactical objectives and specific techniques with real-world examples.

  • Threat Actor Profiles

Documents known adversary groups with associated TTPs enabling targeted defensive prioritization.

  • Mitigation Guidance

Provides defensive recommendations for each technique supporting control implementation decisions.

  • Detection Guidance

Offers data sources and detection approaches for identifying technique execution.

  • ATT&CK Navigator

Provides visualization tooling for mapping coverage, priorities, and threat actor overlays.

Framework Scope

MITRE ATT&CK applies to organizations across all sectors using it for threat intelligence, detection engineering, red teaming, and security control assessment. Matrices cover Enterprise IT, cloud, mobile, and industrial control system environments.

Framework Objectives

MITRE ATT&CK provides a comprehensive adversary behavior knowledge base enabling threat-informed defense and security improvement.

  • Document real-world adversary techniques enabling systematic defensive improvement
  • Provide common language for communicating about threats across security teams
  • Enable security control gap analysis against empirical threat behavior
  • Support threat intelligence enrichment and sharing with structured context
  • Facilitate red team and detection engineering activities

MITRE ATT&CK integrates with CIS Controls, NIST SP 800-53, and D3FEND. Security teams implement it for threat intelligence programs, detection engineering, control assessments, and adversary simulation activities.

Common Framework Mappings

Mapped frameworks include:

CIS Critical Security Controls

D3FEND

IEC 62443

NIST Cybersecurity Framework

NIST SP 800-53

OWASP Top Ten

SOC 2

At a Glance
MITRE ATT&CK
  • checklist
    Classicifation
    Category
    info
    Cybersecurity
    Domain
    info
    Cybersecurity
    Framework Family
    info
    MITRE ATT&CK
  • info
    Regulatory Context
    Type
    info
    Standard
    Sector
    info
    Cross-Sector
    Industry
    info
    Cross-Industry
  • arrow_upload_ready
    Region / Publisher
    Region
    info
    Global
    Region Detail
    info
    United States
    Publisher
    info
    MITRE Corporation
  • published_with_changes
    Versioning
    Version
    info
    ATT&CK v10
    Effective Date
    info
    2015
    Issue Date
    info
    2013
  • graph_3
    Adoption
    Adoption Model
    info
    Operational Security
    Implementation Complexity
    info
    Moderate
  • captive_portal
    Official Reference
License Information

License included / downloadable: Yes

MITRE ATT&CK is publicly available and maintained by MITRE Corporation as an open knowledge base.

Official Resources
MITRE ATT&CK Framework Overview
Provides an introduction to the MITRE ATT&CK framework and its application in cybersecurity.
chevron_forward
MITRE ATT&CK Tactics and Techniques Documentation
Describes the detailed tactics and techniques within the MITRE ATT&CK framework.
chevron_forward
MITRE ATT&CK Navigator Tool
Offers a tool for exploring and visualizing the ATT&CK framework’s components and relationships.
chevron_forward
MITRE ATT&CK Use Case Examples
Defines practical examples of how organizations implement ATT&CK in real-world scenarios.
chevron_forward
ATT&CK Evaluation Methodology
Outlines the methodology used for evaluating security products against the ATT&CK framework.
chevron_forward
SMARTSUITE

How SmartSuite Supports MITRE ATT&CK 10

Centralize controls, evidence, and audit workflows to stay continuously SOC 2–ready.

ATT&CK Technique Coverage Map

Track coverage by tactic/technique and identify detection and control gaps.

Detection Engineering Backlog

Manage detection workstreams with owners, priorities, and implementation status.

Test Plans and Validation Evidence

Store purple-team results, simulations, and validation proof tied to techniques.

Incident Response Playbooks

Link playbooks and response tasks to ATT&CK behaviors for consistent handling.

Exceptions and Risk Acceptance

Document gaps, compensating controls, approvals, and timelines to close coverage.

Executive Threat Detection Reporting

Report detection maturity and coverage trends by tactic, technique, and team.

Related frameworks

NIST CSF 2.0

NIST Cybersecurity Framework (CSF) v2.0 is a risk-based framework that helps organizations manage and reduce cybersecurity risks.

Learn More
arrow_forward
ONBOARDING FAQS

Frequently Asked Questions For MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge)

What is MITRE ATT&CK used for?

MITRE ATT&CK is used to document and analyze adversary tactics, techniques, and procedures observed in real-world cyber attacks. Organizations use it to inform threat detection, enhance incident response, and evaluate the effectiveness of security controls against known attacker behaviors.

Is MITRE ATT&CK a required or certifiable standard?

MITRE ATT&CK is not a certifiable standard and is not mandated by regulatory bodies. It is a freely available knowledge framework adopted voluntarily to strengthen cybersecurity practices and improve threat-informed defense initiatives.

Who should use the MITRE ATT&CK framework and what is its scope?

The MITRE ATT&CK framework is suitable for security teams, threat intelligence analysts, SOC operators, and compliance professionals across all industry sectors. Its scope covers a comprehensive range of adversary behaviors, tactics, and techniques applicable throughout the cyber attack lifecycle.

What are the key concepts or components of MITRE ATT&CK?

Key components of MITRE ATT&CK include a matrix of tactics (attacker goals), techniques (methods to achieve those goals), and procedures (specific implementations observed in the wild). The framework also contains mappings to threat actor profiles and specific incidents, facilitating detailed threat intelligence analysis.

How is MITRE ATT&CK implemented in an organization?

Organizations implement MITRE ATT&CK by mapping internal security controls and monitoring activities to specific ATT&CK techniques. This includes developing detection analytics, documenting coverage, and aligning incident response procedures with the framework to address identified gaps.

How does MITRE ATT&CK relate to other cybersecurity frameworks?

MITRE ATT&CK complements other cybersecurity frameworks such as the NIST Cybersecurity Framework and ISO 27001 by providing concrete examples of attacker actions. It is often used alongside these frameworks to inform risk assessments, threat modeling, and control selection.

What are the ongoing compliance or maintenance requirements for using MITRE ATT&CK?

Effective use of MITRE ATT&CK requires ongoing mapping of new threats, regular review of security control effectiveness, and continuous updating of threat intelligence sources. Organizations should ensure their coverage remains current as attacker tactics and techniques evolve.

How would SmartSuite support MITRE ATT&CK?

SmartSuite supports MITRE ATT&CK by providing mapped security control libraries, centralized risk and threat registers, and policy governance tools. Organizations can collect and document evidence of ATT&CK technique coverage, manage remediation workflows, maintain audit readiness, and generate detailed reports on threat monitoring and compliance status.

NEXT STEP

Put CRI Profile into action with SmartSuite

Map controls, collect evidence, run assessments, manage remediation, and report readiness - all from a single connected system.

Explore in SmartSuite
chevron_forward
View all Frameworks
chevron_forward