The MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) model was created in 2013 from MITRE's Fort Meade Experiment where researchers studied adversary and defender behavior to try and improve post-compromise detection of threats. MITRE ATT&CK is used throughout the world and across multiple disciplines including threat hunting, security engineering, intrusion detection, risk management, and threat intelligence. Learn how the compliance framework can work for your business.
This framework provides a knowledge base of adversarial techniques, classified by tactics (short term tactical attack goals) and techniques (how cybercriminals achieved specific tactics). Rather than focusing on abstract kill chains and tools, the MITRE framework focuses on how cybercriminals interact with systems during a security event. MITRE ATT&CK is structured this way for a few reasons:
MITRE ATT&CK leverages endpoint telemetry data and analytics to improve post-compromise detection of adversaries within a corporate network. The framework can be applied to Windows, macOS, Linux, Network infrastructure devices, container technologies; cloud systems covering IaaS, SaaS, Office 365, Azure AD, and Google Workspace; mobile devices covering Android and iOS.
There are many ways to utilize the information within MITRE ATT&CK - by tactic, technique, and environment. ATT&CK for Enterprises focuses on adversarial behavior in Linux, Windows, Mac, and cloud environments. ATT&CK for Mobile targets adversarial behavior on Android and iOS operating systems. The final category, Pre-ATT&CK, focuses on pre-exploit adversarial behavior, and is couched within the ATT&CK for Enterprise matrix:
When looking at the matrix, tactics are organized into 14 columns, with specific techniques outlined below. The tactics provide high-level notations for things adversaries do during an operation, such as persist, discover information, move laterally, execute files, and exfiltrate data. The techniques represent the means of achieving a specific tactic, what an adversary stands to gain, and the type of information they're targeting. The tactics include:
The goal of this platform is to protect your business from breaches and cybercriminals. There are multiple steps for a cybercriminal to hack into a network system and ATT&CK uses tactics at every stage to prevent them from succeeding in a breach. ATT&CK can help businesses in multiple ways including:
Implementing MITRE ATT&CK often involves manual mapping or some integration with security tools which typically include Security Information and Event Management (SIEM), Endpoint Detection and Response (EDR), or a Cloud Access Security Broker (CASB). If you want to learn more about cybersecurity and compliance frameworks, contact iCorps for a free IT consultation.