Jump to: navigation, search

The tactic categories for ATT&CK were derived from the later stages (control, maintain, and execute) of the seven stage Cyber Attack Lifecycle (first articulated by Lockheed Martin as the Cyber Kill Chain®[1]). This provides a deeper level of granularity in describing what can occur during an intrusion after an adversary has acquired access.

Each category contains a listing of techniques that an adversary could use to perform that tactic. Techniques are broken down to provide a technical description, indicators, useful defensive sensor data, detection analytics, and potential mitigations. Applying intrusion data to the model then helps focus defense on the commonly used techniques across groups of activity and helps identify gaps in security. Defenders and decision makers can use the information in ATT&CK for various purposes, not just as a checklist of specific adversarial techniques.

Pages in category "Tactic"

The following 10 pages are in this category, out of 10 total.