Need Professional IT Services?
Our IT professionals can help optimize your infrastructure and improve your operations.
Explore the MITRE ATT&CK Framework
Navigate the ATT&CK knowledge base of adversary tactics, techniques, and procedures (TTPs).
Matrix Categories
- Tactics: The "why" - adversary goals
- Techniques: The "how" - methods used
- Sub-techniques: Specific variations
- Mitigations: Defensive measures
- Detections: How to spot attacks
Uses
Threat modeling, security assessments, incident analysis, detection engineering.
References & Citations
- MITRE Corporation. (2024). MITRE ATT&CK. Retrieved from https://attack.mitre.org/ (accessed January 2025)
- MITRE Corporation. (2024). ATT&CK Navigator. Retrieved from https://mitre-attack.github.io/attack-navigator/ (accessed January 2025)
- MITRE Corporation. (2024). Getting Started with ATT&CK. Retrieved from https://attack.mitre.org/resources/getting-started/ (accessed January 2025)
Note: These citations are provided for informational and educational purposes. Always verify information with the original sources and consult with qualified professionals for specific advice related to your situation.
Key Security Terms
Understand the essential concepts behind this tool
Frequently Asked Questions
Common questions about the MITRE ATT&CK Navigator
MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is globally-accessible knowledge base of adversary behaviors. Organized by 14 tactics (objectives) and 200+ techniques (methods). Covers: Enterprise (Windows, Linux, macOS, Cloud), Mobile, ICS (industrial). Used for: threat intelligence, detection engineering, red teaming, security assessments. Based on real-world observations. Free, community-driven. Updated quarterly. Essential reference for cybersecurity professionals.