​
MITRE ATT&CK Framework Enterprise
MITRE started the project in 2013 to document [TTP] Tactics/Techniques/Procedures that [APT] advanced persistent threat groups use against enterprise businesses. The framework can be applied to any technology or software application that may be targeted by attackers.
​
MITRE
-
Not an acronym but the companies name
ATT&CK
-
[AT] Adversarial Tactics
-
[T] Techniques
-
[CK] Common Knowledge
​
How is MITRE ATT&CK structured?
MITRE ATT&CK is organized around the phases of an attack, from initial access to post-compromise activities. Each phase is divided into a series of techniques and tactics used by adversaries to achieve their objectives.
How can I use MITRE ATT&CK?
Organizations can use MITRE ATT&CK to develop threat models, evaluate security tool efficacy, develop detection strategies and prioritize security investments. Additionally, it can be used to share threat and defense information between organizations.