MITRE ATTACK Framework: Tactics, Techniques and More

5 분 읽기
MITRE ATTACK main takeaways:
  • MITRE ATT&CK® is a globally recognized knowledge base of adversary behaviors, tactics, and techniques from real-world attacks.

  • The framework covers PRE-ATT&CK, Windows, macOS, Linux, networks, containers, mobile, ICS, and the cloud.

  • Your team can leverage MITRE ATT&CK’s framework to simulate attack scenarios against your cloud infrastructure, which allows you to find and patch vulnerabilities before they become actual breaches.

  • Wiz maps real-time detections and threat intel to MITRE ATT&CK, improving response workflows and threat prioritization.

What is the MITRE ATTACK framework?

The MITRE ATT&CK framework is a living knowledge base of cyberattack tactics and techniques based on real-world adversary behavior. It’s the product of MITRE’s Fort Meade Experiment, which involved researchers simulating threat actors’ and defenders’ behaviors to analyze and optimize data breach responses. These findings, along with subsequent work, have helped organizations improve their threat responses and prevention.

MITRE, a nonprofit organization, released MITRE ATT&CK in 2013. The framework now covers:

  • PRE-ATT&CK

  • Windows

  • macOS

  • Linux

  • Networks

  • Containers

  • Mobile, ICS, and the cloud

Among other matrices that MITRE offers, the MITRE ATT&CK cloud matrix is unique because, as its name implies, it specifically focuses on cloud-centric security threats. This includes threats across:

  • IaaS

  • SaaS

  • PaaS services from cloud providers (like GCP, Azure, and AWS) 

Since the 2024 global average cost per data breach is $4.88M USD, threat modeling using MITRE ATT&CK is an invaluable resource for any public or private organization that’s in the crosshairs of cyber adversaries. Its data comes from diverse sources, including public threat intelligence, cyber incident reports, and other research initiatives by leading cybersecurity professionals. 

Below are top use cases for MITRE ATT&CK, its benefits, and tactics to help you apply it to your organization. Plus, find out how to use the right platform to implement and manage multiple compliance frameworks across your cloud environments. 

Top use cases for the MITRE ATT&CK framework

Here are some key ways you can implement MITRE ATT&CK today:

Initiate threat modeling

Your team can leverage the MITRE ATT&CK framework to simulate attack scenarios against your cloud infrastructure. This will allow you to find vulnerabilities and patch them before they become actual breaches.  

To implement threat modeling, choose a high-value cloud workload to focus on. That way, you can run adversary emulation with mapped ATT&CK tactics and document any gaps you may need to fix.

You can also include:

  • Asset and data flow mapping to identify your cloud assets, like virtual machines (VMs) and containers, and map out data flows and activity

  • Control mapping to catalog existing security controls

  • MITRE ATT&CK Navigator to view assets and controls against techniques and tactics

Conduct a gap analysis

An example of a cross-framework heatmap for compliance

You can also map out your existing security controls against the MITRE ATT&CK framework to find missing security best practices throughout your coverage. This helps you prioritize the most critical weaknesses and choose the right tools and protocols to improve your security.

To assess and improve your cloud security, you can also adopt Wiz for compliance. This platform provides continuous assessments and reporting on your frameworks so you can ensure that you’re meeting cloud security standards.

Improve red teaming protocols and practice adversary emulation

According to Greg Young, vice president of cybersecurity at Trend Micro, “tests [can inform] companies’ own security ops centers and their own red teaming behavior—looking at it and saying, ‘Well, what are adversaries using today?’”

Whether you’re dealing with a simulation or a real-world attack, the MITRE ATT&CK framework provides a clear roadmap and structured approach to detecting and responding to threats. To get started, conduct red teaming exercises for a specific threat actor profile. You should also conduct adversary emulation to simulate real-world attack scenarios for a specific cloud workload. 

You can improve your protocols in the following ways:

  • Choose a MITRE ATT&CK threat profile for your red teaming exercises to evaluate responses.

  • Perform adversary emulation exercises throughout your cloud workloads to simulate attacks and test your defenses.

Enhance incident response

Your security operations team can leverage the MITRE ATT&CK framework to study the most effective tactics and techniques for security incidents. This allows you to perform more effective investigations and threat remediation—and, as a result, will speed up your response time and process and lower attacks’ impact. 

When you conduct your next incident review, analyze the attacker’s behavior and use ATT&CK to find missed detection opportunities so you can improve your cloud security posture. You can do so by following these steps: 

  • Map attacker behaviors from incidents to MITRE ATT&CK tactics to spot missed detections.

  • Embed ATT&CK frameworks into incident response plans.

  • Leverage automated tools with ATT&CK mapping to speed up detection, response, and remediation.

What are the benefits of implementing MITRE ATTACK?

By leveraging the MITRE ATT&CK framework, companies can: 

  • Standardize threat intel: Use a common taxonomy that lets security teams tag, search, and correlate threats across tools.

  • Improve detection engineering: Map detections to attacker behaviors (like credential access or defense evasion).

  • Enable gap analysis: Identify which cloud services (such as storage or APIs) lack detection coverage.

  • Support proactive defense: Inform blue and purple teaming exercises to simulate real adversary movements in cloud environments.

Understanding MITRE ATT&CK matrices

The MITRE ATTACK framework features three primary matrices that MITRE has organized around  specific tactics, techniques, and procedures (TTPs):

  • Tactics describe overall attacker objectives.

  • Techniques include the methods that adversaries use to meet those objectives.

  • Procedures are the apparatus, tools, and actions that attackers use to conduct cyberattacks. (Note: While procedures are present within the framework, they aren’t formally part of the matrices themselves.) 

Here’s a breakdown of the three matrices:

  • Enterprise: Focuses on enterprise network security and IT environments

  • Mobile: Emphasizes mobile-related cyber threats

  • ICS: Covers protecting industrial control systems and networks

The Enterprise matrix has seven platform- and operating system–specific categories that focus on: 

  • Cloud and SaaS environments like SaaS, IaaS, Azure AD, Office 365, and Google Workspace

  • Operating systems like Windows, macOS, and Linux

  • Network and container environments like network devices and container technologies

  • PRE-ATT&CK techniques like preparedness activities before initiating access 

What tactics does MITRE ATTACK list? 

The following is a breakdown of the 14 attack tactics, from recon to impact, in the Enterprise matrix:

TacticDescription
ReconnaissanceCollecting data about a potential victim
Resource developmentGathering resources for a potential attack
Initial accessBreaching a network for the first time
ExecutionInjecting malicious code into the victim’s network and other adversary-controlled code
PersistenceGaining a foothold in the victim’s IT environment
Privilege escalationSecuring higher access privileges
Defense evasionSidestepping security mechanisms
Credential accessStealing credentials from legitimate accounts
DiscoveryExploring various components of a victim’s network
Lateral movementMoving across a victim’s IT environment
CollectionCollecting sensitive enterprise data
Command and controlCommunicating with compromised systems, like hijacked incidents
ExfiltrationStealing sensitive data from enterprises
ImpactDamaging enterprise IT environments

What are the techniques in MITRE ATTACK? 

There are too many MITRE ATT&CK techniques and sub-techniques to explore in a single post—the Enterprise matrix alone features 203 techniques and 453 sub-techniques. 

Below are a few examples of techniques for each of the 14 Enterprise tactics:

TacticExample techniqueDetection
ReconnaissanceActive Scanning (T1595)Monitor for unusual inbound traffic targeting exposed cloud services (like S3, EC2, or Load Balancers).
Resource DevelopmentAcquire Infrastructure (T1583)Track domain registration, new external IPs, and rogue cloud accounts impersonating your org.
Initial AccessValid Accounts (T1078)Look for logins from unfamiliar geolocations or impossible travel times using identity and access management (IAM) credentials.
ExecutionUser Execution (T1204)Detect suspicious command execution or script activity in containers and VMs that external users trigger.
PersistenceCreate Cloud Account (T1136.003)Monitor new IAM user or role creation outside of expected provisioning pipelines.
Privilege EscalationAbuse Elevation Control (T1548)Flag unauthorized use of sudo or admin privileges within cloud workloads or CI/CD pipelines.
Defense EvasionImpair Defenses (T1562)Detect disabled cloud logging services (like CloudTrail, Azure Monitor or GCP Logging).
Credential AccessSteal Application Access Token (T1528)Alert on suspicious access token usage across services or anomalous API calls using tokens.
DiscoveryCloud Service Discovery (T1526)Look for enumeration activity targeting APIs, metadata endpoints, or cloud asset inventories.
Lateral MovementRemote Services (T1021)Track unexpected lateral SSH or API access across VPCs, accounts, or projects.
CollectionData from Cloud Storage (T1530)Monitor access to sensitive buckets or blobs—especially from temporary credentials or external IPs.
Command & Control (C2)Application Layer Protocol (T1071)Detect the use of common protocols (like HTTPS) in unusual patterns (such as timing, volume, or destinations).
ExfiltrationExfiltration Over Web Service (T1567)Track abnormal data movement to external SaaS or cloud storage services from internal workloads.
ImpactData Destruction (T1485)Detect mass deletion activity in production storage (like S3 or Azure Blobs) or critical databases.

How is MITRE ATTACK different from Cyber Attack Chain?

Like MITRE ATTACK, the Cyber Attack Chain (Cyber Kill Chain®) is a cybersecurity framework that can help businesses and their security teams protect themselves from cyberattacks. Lockheed Martin published the Cyber Attack Chain in 2011. 

While both MITRE ATT&CK and the Cyber Kill Chain aim to describe attacker behavior, ATT&CK is broader, more detailed, and more effective for practical detection. Here’s how they differ:

MITRE ATTACKCyber Attack Chain
Features 14 Enterprise tactics, 12 Mobile tactics, and 12 ICS tacticsFeatures seven tactics: reconnaissance, weaponization, delivery, exploitation, installation, C2, and actions on objectives
Doesn’t establish or presuppose that cyberattacks follow a particular sequenceStates that all attacks feature the same sequence of tactics
Doesn’t focus on linear sequences but does emphasize hierarchies of tactics, techniques, and proceduresLinearly anatomizes cyberattacks but doesn’t offer hierarchical breakdowns
Focuses on how cyber adversaries facilitate attacks, why they do so, and with what toolsLacks techniques, subtechniques, and procedures and instead focuses on a step-by-step breakdown of adversarial behavior
Provides a source for enterprises to establish protective measures across the cyberattack lifecycleIs more useful in the initial stages of a threat detection process
Features regular updates and improvements from numerous cybersecurity expertsDoesn’t feature many iterative improvements or community-led contributions
Provides a toolkit for users to design remediation and mitigation playbooksDoesn’t offer any in-depth mitigation strategies that businesses can apply to ward off cyberattacks

How Wiz and MITRE ATT&CK can defend your cloud environments

A Wiz compliance dashboard shows a 90% average compliance posture.

Wiz integrates the MITRE ATT&CK framework into its CNAPP by mapping detections, alerts, and attack paths directly to ATT&CK techniques. This enables security teams to:

  • Prioritize threats based on mapped TTPs

  • Accelerate triage by showing which tactics are in play

  • Run simulations using real adversary behaviors

  • Visualize detection coverage gaps across your environment

While Wiz’s CNAPP is an industry leader in detection and response, Wiz Defend also provides correlation across cloud and runtime layers with unmatched context, making it easier for rapid triage and response. 

Another huge benefit is that Wiz weaves MITRE ATT&CK into its capabilities by mapping its rule set to MITRE tactics and techniques within its Cloud Threat Landscape

Ready to learn more about how to tackle emerging threats? Check out Wiz’s Quickstart Template for Cloud Incident Response today.

See Your Cloud Activities Come to Life

Schedule a demo to learn how Wiz can detect and analyze threats in context so that you can prioritize, investigate, and respond quickly to the right risks.

데모 신청하기 
    OSZAR »