What is MITRE ATT&CK Framework? Overview of Tactics and Techniques
The MITRE ATT&CK framework is a comprehensive and globally-accessible knowledge base that documents adversary tactics and techniques based on real-world observations of cyberattacks. It was developed by the MITRE Corporation to help organizations understand and improve their cybersecurity defenses by modeling the behaviors of attackers across various stages of an attack.
Key elements of the MITRE ATT&CK framework include:
The framework covers various platforms such as Windows, Linux, macOS, and cloud environments, making it highly versatile. By adopting the MITRE ATT&CK framework, organizations can more effectively anticipate, detect, and respond to cyber threats by understanding the tactics, techniques, and procedures (TTPs) of attackers.
It is widely regarded as one of the most detailed and practical resources for threat intelligence and is used by both private enterprises and governmental agencies to bolster their cybersecurity strategies.
MITRE ATT&CK framework Tactics and Techniques
The MITRE ATT&CK framework consists of 14 tactics, each representing a specific goal that adversaries aim to achieve during a cyberattack. Below is a detailed overview of each tactic. Each MITRE ATT&CK tactic encompasses multiple techniques, which describe the specific methods adversaries use to achieve their tactical goals. For example, under the tactic of Initial Access, techniques might include phishing or exploiting software vulnerabilities. The current ATT&CK framework includes over 200 techniques, along with numerous sub-techniques that provide further detail on how each technique can be executed.
1. Reconnaissance
Goal: Gather information to plan future operations.
2. Resource Development
Goal: Establish resources for future operations.
3. Initial Access
Goal: Gain entry into a target network.
4. Execution
Goal: Run malicious code on a target system.
5. Persistence
Goal: Maintain a foothold in the network.
6. Privilege Escalation
Goal: Gain higher-level permissions on a system.
7. Defense Evasion
Goal: Avoid detection by security measures.
8. Credential Access
Goal: Obtain user credentials for further access.
9. Discovery
Goal: Understand the environment and its components.
Recommended by LinkedIn
10. Lateral Movement
Goal: Move through the network to access additional resources.
11. Collection
Goal: Gather data of interest from the target environment.
12. Command and Control (C2)
Goal: Establish communication with compromised systems.
13. Exfiltration
Goal: Remove data from the target environment.
14. Impact
Goal: Cause damage or disruption to the target organization.
Each of these tactics is further supported by multiple techniques and sub-techniques that detail how adversaries implement their strategies in real-world scenarios. The MITRE ATT&CK framework is an invaluable tool for cybersecurity professionals in understanding and defending against cyber threats effectively .
Applications of the MITRE ATT&CK Framework
1. Threat Detection and Response
2. Vulnerability Management
3. Security Operations Center (SOC) Maturity Assessment
4. Threat Intelligence Integration
5. Red Teaming and Penetration Testing
6. Training and Skill Development
7. Tool Evaluation and Vendor Assessment
8. Improving Overall Security Posture
Email: info@secureb4.io
Phone: +971 56 561 2349
Website: Secureb4.io