What is MITRE ATT&CK?
A Framework for Understanding Cyber Crime
It may look like "ATT&CK" is a relevant word with a lookalike symbol inserted as a substitute for a letter, like people sometimes use for their passwords (a nice effort, but still vulnerable: see the Brute Force technique). While that may be the case, it's actually an acronym, short for Adversarial Tactics, Techniques & Common Knowledge. The government-supported cybersecurity corporation MITRE first created the ATT&CK chart in 2013 to compile and organize known attacker actions. This allowed for a whole new perception into the world of malicious cyber behavior. (Previously, defenders were mainly just looking at IP addresses and domain names.) It created a roadmap for organizations to see where they stand in terms of vulnerability to particular maneuvers, and it categorized the mess of cyber crime into a neat and handy chart with a common language that could be shared across industries.The Elements of an ATT&CK Matrix
[caption id="attachment_6608" align="alignnone" width="923"]

Applications for MITRE ATT&CK
Anyone who's interested can access this extensive knowledge graph for free. Its usefulness spans the range of informing, communicating, tracking, testing, and responding. Mapping an organization's defenses to ATT&CK can highlight security gaps and help defenders continually improve. These applications are utilized by both government intelligence and the private sector, creating a uniform foundation for cybersecurity professionals in any industry to build defense strategies and mechanisms.What's Necessary to Make the Best Use of MITRE ATT&CK?
While the ATT&CK framework provides unrivaled insights into attack methods, that doesn't mean it's without limitations. It's important to remember that this index is based on known, real attacks---so there are potential actions that adversaries could do as they continue to learn and evolve, which aren't listed in ATT&CK. Also, techniques can be executed in a variety of ways, so detecting and blocking one route can leave security teams with a false confidence in their protection against that tactic. In any case, organizations won't make the most of MITRE ATT&CK without mapping a defense solution to its framework. This can be done manually or through automated approaches, or ideally as a combination of both. The level to which an organization is able to map to ATT&CK's details will determine the extent of its value. An exciting complement to ATT&CK published this year is MITRE D3FEND, which similarly outlines defensive techniques against infiltrations. Read more about that here.Stay connected. Join the Infused Innovations email list!
Share this
You May Also Like
These Related Posts
MITRE D3FEND and Azure Mappings: Counteracting ATT&CK Methods

MITRE D3FEND and Azure Mappings: Counteracting ATT&CK Methods
October 25, 2021
3
min read
Cyberattacks in 2021 Doubled Those of 2020

Cyberattacks in 2021 Doubled Those of 2020
December 6, 2021
5
min read
What Are Verifiable Credentials?

What Are Verifiable Credentials?
December 20, 2021
4
min read
No Comments Yet
Let us know what you think