Enterprise Matrix

Below are the tactics and techniques representing the MITRE ATT&CK® Matrix for Enterprise. The Matrix contains information for the following platforms: Windows, macOS, Linux, PRE, Office Suite, Identity Provider, SaaS, IaaS, Network Devices, Containers, ESXi.

Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Stealth Defense Impairment Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
12 techniques 9 techniques 11 techniques 20 techniques 22 techniques 13 techniques 30 techniques 18 techniques 17 techniques 34 techniques 9 techniques 17 techniques 18 techniques 9 techniques 15 techniques
Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Stealth Defense Impairment Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
12 techniques 9 techniques 11 techniques 20 techniques 22 techniques 13 techniques 30 techniques 18 techniques 17 techniques 34 techniques 9 techniques 17 techniques 18 techniques 9 techniques 15 techniques