This site has been deprecated in favor of and will remain in place until 11/1/22.


From attackics
Jump to navigation Jump to search

The nine tactic categories for ATT&CK were derived from the later stages (control, maintain, and execute) of the seven stage Cyber Attack Lifecycle (first articulated by Lockheed Martin as the Cyber Kill Chain®[1]). This provides a deeper level of granularity in describing what can occur during an intrusion after an adversary has acquired access.

Each category contains a listing of techniques that an adversary could use to perform that tactic. Techniques are broken down to provide a technical description, indicators, useful defensive sensor data, detection analytics, and potential mitigations. Applying intrusion data to the model then helps focus defense on the commonly used techniques across groups of activity and helps identify gaps in security. Defenders and decision makers can use the information in ATT&CK for various purposes, not just as a checklist of specific adversarial techniques.

This category uses the form Tactic.