Skip to main content

Frameworks & Resources: MITRE ATT&CK Framework v15.1

The MITRE ATT&CK Framework is a global knowledge base of adversary tactics and techniques documenting how threat actors operate across the attack lifecycle.

L
Written by Leart Kollqaku
Updated this week

Why Use MITRE ATT&CK in Ardoq?

Using MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) in Ardoq enables organizations to map their security controls and detection capabilities against known adversary behaviors, identify coverage gaps, and prioritize security investments. It provides a common framework for threat intelligence, detection engineering, and security operations teams to communicate about threats and defenses.

How Ardoq Adopts MITRE ATT&CK v15.1

The MITRE ATT&CK framework is implemented as a single workspace containing the complete taxonomy of Tactics, Techniques, and Sub-techniques from the Enterprise ATT&CK Matrix.

Structure Element

Details

Workspace Name

Mitre Att&ck Framework v15.1

Component Types

β€’ Risk Category - The category component is used when multiple components need to be organized in a categorized hierarchy. This may be of arbitrary depth, with the leaf nodes being of the component type that is organized in the hierarchy. The component type name may optionally be made more specific with a prefix (e.g. Risk Category or Process Category).

β€’ Risk - A risk is a potential event that, should it occur, will cause a loss to the organization. They may be financial, strategic, operational or hazard, with potential impact across any part of an organization. Some types of risk have particular consequences for IT systems, technologies and networks. These include information security and cyber-risks and threats.

Framework Structure

The workspace organizes MITRE ATT&CK into 14 tactical categories:

  • Collection - Techniques for gathering information from target systems

  • Command and Control - Methods adversaries use to communicate with compromised systems

  • Credential Access - Techniques for stealing account credentials

  • Defense Evasion - Methods to avoid detection during an operation

  • Discovery - Techniques for gaining knowledge about systems and networks

  • Execution - Techniques for running adversary-controlled code

  • Exfiltration - Methods for stealing data from the network

  • Impact - Techniques for disrupting availability or compromising integrity

  • Initial Access - Techniques used to gain entry into a network

  • Lateral Movement - Techniques for moving through the environment

  • Persistence - Techniques for maintaining access to systems

  • Privilege Escalation - Techniques for gaining higher-level permissions

  • Reconnaissance - Techniques for gathering information before an attack

  • Resource Development - Techniques for establishing resources to support operations


Importing MITRE ATT&CK into Ardoq

Access the MITRE ATT&CK framework through Ardoq's Frameworks & Resources Importer. For step-by-step instructions, see How to use the Frameworks & Resources Importer.

Did this answer your question?