Published: Oct 11, 2024
The Mitre ATT&CK -- pronounced miter attack -- framework is a free, globally accessible knowledge base that describes the latest behaviors and tactics of cyberadversaries to help organizations strengthen their cybersecurity strategies. The acronym ATT&CK stands for Adversarial Tactics, Techniques and Common Knowledge. That's the basis for the framework and accompanying ATT&CK knowledge base.
The framework is used across multiple fields and disciplines, including intrusion detection systems, threat hunting, red teaming, security engineering, threat intelligence and risk management.
Organizations can use the framework to evaluate and test their security methods and to vet cybersecurity vendor products and services. Security vendors use Mitre ATT&CK to ensure their offerings make defending against and responding to security events faster and more effective.
Components of the Mitre ATT&CK frameworkMitre Corp., a not-for-profit security research organization, created and continues to curate the ATT&CK framework and cyberthreat intelligence knowledge base. The knowledge base contains analyses based on real-world events that organizations can reference when developing threat models and methodologies. It grows, and thus informs the framework, as organizations contribute cyberthreat knowledge. Mitre aims to foster a stronger overall cybersecurity community with these free offerings.
Mitre has established three iterations of the ATT&CK framework:
The framework evaluation criteria are specific to each organization using it and focus on the details of an organization's cybersecurity approach. The results of the evaluations are noncompetitive; organizations can't use results to gain a business advantage over other organizations that have been evaluated.
These 14 tactics are included in the enterprise Mitre ATT&CK matrix. Tactics and techniques in the ATT&CK frameworkTactics and techniques are Mitre's two different ways of categorizing adversarial behavior. By Mitre's definition, an ATT&CK technique describes how adversaries achieve their objective and, in some cases, what they gain from achieving that objective. An ATT&CK tactic describes the objective, or reason, for performing the attack.
Techniques show the information that attackers are after and how they go about getting it. Tactics explain why they want it. Multiple techniques can be used to achieve a tactical objective.
The following 14 tactics are included in the enterprise Mitre ATT&CK matrix:
The main objective of the ATT&CK Matrix is to provide organizations with a deeper understanding of potential threat actors and to help them formulate more thorough defense strategies over attack lifecycles.
A visualization of the relationship between attacker tactics and attacker techniques is shown as a large table on the Mitre ATT&CK website. Each tactic or technique is clickable and leads to more detailed explanations of the term. An organization can use this matrix to pinpoint the exact adversarial behavior it wants to learn more about for defense purposes.
Because multiple techniques can be used to achieve a given outcome, the ATT&CK Enterprise Matrix includes multiple techniques in each tactic category. Currently there are 202 techniques and 435 subtechniques in the ATT&CK enterprise framework. The tactics are listed on the x-axis and the techniques are listed on the y-axis.
For example, if a user clicks on the "Initial Access" tactic, they're presented with 10 techniques and their descriptions. The first three items on the list are "Content Injection," "Drive-by Compromise" and "Exploit Public-Facing Application." If the user clicks on "Content Injection," they're taken to a page that describes the attack in more detail, provides procedure examples and lists subtechniques.
Mitre ATT&CK use casesThe Mitre framework has several use cases that make it compelling for organizations as well as managed security service providers and manufacturers of cybersecurity systems and software. Common use cases of the framework include the following:
The benefits of the Mitre framework include the following:
The framework enables a business to do the following:
There are several ways an organization can use Mitre ATT&CK to strengthen its cybersecurity strategies:
The key is understanding how to use the framework to maintain a high level of awareness of potential threats and how to respond to them.
Mitre ATT&CK vs. Cyber Kill ChainBoth the Cyber Kill Chain and Mitre ATT&CK are frameworks used in cybersecurity. However, their approaches, structures and points of emphasis are different.
Lockheed Martin developed the Cyber Kill Chain model in 2011. It outlines the stages of a cyberattack from initial reconnaissance to data exfiltration. The Cyber Kill Chain involves seven steps:
The ATT&CK framework focuses on the methods adversaries use when preparing and delivering their attacks. The idea is to get into the mind of the attacker so that ideal preparations can be made to counter an attack. By contrast, the National Institute for Standards and Technology Cybersecurity Framework (NIST CSF) is a risk-based blueprint for government and nongovernment organizations to establish and maintain an optimum security posture.
Each framework has its own set of characteristics; Mitre ATT&CK has its tactics and techniques, and NIST CSF has a set of core functions. There's overlap across the two frameworks, but in practice they complement each other. NIST CSF provides the foundation for a secure cybersecurity governance structure, and Mitre ATT&CK provides the action-oriented guidance to prepare, protect and defend the organization from an attack. CSF provides the what and why behind the security strategy, while ATT&CK delivers the how-to tactics.
Mitre ATT&CK historyMitre launched ATT&CK in 2013 to document common tactics, a common language, and techniques and procedures that advanced persistent threats used against Windows enterprise networks. Experiential data came from real-world observations.
ATT&CK began as an effort to gather this data for a research project on detecting threats in enterprise networks post-compromise, such as after adversaries had broken in. This was used to identify adversary techniques and from there to develop adversary emulation techniques.
Mitre's Fort Meade Experiment involved close observation of more than 200 hosts on a monitored network segment. It ran red team operations on this network, designating teams to act as attackers using known techniques to penetrate the network. A blue team then attempted to detect and mitigate these simulated attacks.
By simulating the complete cybersecurity landscape from both the attacker's and defender's perspective, Mitre formulated the following key insights that it uses as the basis of its ATT&CK framework:
By applying these principles in a controlled research setting, Mitre verified it could improve the threat detection capabilities of networks in a measurable way. It also improved incident response.
In 2015, Mitre released the ATT&CK framework to the public. It has since expanded to include threats to macOS X, Linux and mobile device OSes.
In 2020, Mitre released its framework for industrial control systems, which can handle issues and challenges that are exclusive to industrial environments. These systems manage and control critical infrastructure, including manufacturing plants, power plants and other industrial activities.
Learn how to create a cybersecurity awareness training program that will equip employees with the knowledge and skills they need to help protect their organization from cyberattacks.
Continue Reading About What is the Mitre ATT&CK framework? Dig Deeper on Threat detection and responseRetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4