MITRE ATTACK Framework: Tactics, Techniques and More

What is the MITRE ATT&CK framework?

MITRE ATT&CK is a curated knowledge base that catalogs adversary tactics, techniques, and procedures (TTPs) observed in real-world cyberattacks. Security teams use it as a common language to describe threats, map detection coverage, and prioritize defensive investments based on how attackers actually operate.

MITRE, a nonprofit organization, released the framework in 2013 based on research from the Fort Meade Experiment, where researchers simulated attacker and defender behaviors to improve breach response. The framework now spans multiple technology domains including Windows, macOS, Linux, networks, containers, mobile, ICS, and cloud environments.

Among other matrices that MITRE offers, the MITRE ATT&CK cloud matrix is unique because, as its name implies, it specifically focuses on cloud-centric security threats. This includes threats across:

  • IaaS

  • SaaS

  • PaaS services from cloud providers (like GCP, Azure, and AWS)

Find the Gaps in Your ATT&CK Coverage

Get a demo to see how Wiz maps your detections and security controls against the MITRE ATT&CK cloud matrix, so you know exactly where you're exposed.

Pour plus d’informations sur la façon dont Wiz traite vos données personnelles, veuillez consulter notre Politique de confidentialité.

Top use cases for the MITRE ATT&CK framework

Security teams operationalize MITRE ATT&CK in four primary ways: threat modeling to simulate attacks before they happen, gap analysis to identify detection blind spots, adversary emulation to test defenses against real-world TTPs, and incident response to accelerate investigations.

Initiate threat modeling

Threat modeling with ATT&CK lets you simulate attack scenarios against your cloud infrastructure before adversaries do. You identify which techniques are most likely to target your environment, then test whether your current controls would detect or block them.

Start by selecting a high-value cloud workload, then map relevant ATT&CK tactics to that asset. Run adversary emulation exercises and document detection gaps that need remediation.

You can also include:

  • Asset and data flow mapping to identify your cloud assets, like virtual machines (VMs) and containers, and map out data flows and activity

  • Control mapping to catalog existing security controls

  • MITRE ATT&CK Navigator to view assets and controls against techniques and tactics

Conduct a gap analysis

An example of a cross-framework heatmap for compliance

Gap analysis maps your existing security controls against ATT&CK techniques to reveal where detection coverage is missing. For example, you might discover that your environment has strong coverage for Initial Access techniques but lacks visibility into Credential Access or Lateral Movement.

Wiz supports this process by continuously assessing your cloud environment against the MITRE ATT&CK Cloud Matrix, surfacing which techniques lack detection coverage and helping you prioritize remediation based on actual risk.

Improve red teaming protocols and practice adversary emulation

According to Greg Young, vice president of cybersecurity at Trend Micro, "tests [can inform] companies' own security ops centers and their own red teaming behavior—looking at it and saying, 'Well, what are adversaries using today?'"

Whether you're dealing with a simulation or a real-world attack, the MITRE ATT&CK framework provides a clear roadmap and structured approach to detecting and responding to threats. To get started, conduct red teaming exercises for a specific threat actor profile. You should also conduct adversary emulation to simulate real-world attack scenarios for a specific cloud workload.

You can improve your protocols in the following ways:

  • Choose a MITRE ATT&CK threat profile for your red teaming exercises to evaluate responses.

  • Perform adversary emulation exercises throughout your cloud workloads to simulate attacks and test your defenses.

Enhance incident response

Your security operations team can leverage the MITRE ATT&CK framework to study the most effective tactics and techniques for security incidents. This allows you to perform more effective investigations and threat remediation—and, as a result, will speed up your response time and process and lower attacks' impact.

When you conduct your next incident review, analyze the attacker's behavior and use ATT&CK to find missed detection opportunities so you can improve your cloud security posture. You can do so by following these steps:

  • Map attacker behaviors from incidents to MITRE ATT&CK tactics to spot missed detections.

  • Embed ATT&CK frameworks into incident response plans.

  • Leverage automated tools with ATT&CK mapping to speed up detection, response, and remediation.

What are the benefits of implementing MITRE ATT&CK?

By leveraging the MITRE ATT&CK framework, companies can:

  • Standardized threat communication: Teams across SOC, IR, and threat intel use the same taxonomy to tag, search, and correlate threats, eliminating translation overhead between tools and teams.

  • Behavior-based detection engineering: Detections map directly to attacker behaviors like credential access or defense evasion rather than generic indicators, reducing false positives and improving signal quality.

  • Visible coverage gaps: Security leaders can immediately see which cloud services, APIs, or workload types lack detection coverage and prioritize investment accordingly.

  • Realistic adversary emulation: Blue and purple team exercises simulate actual adversary movement patterns rather than theoretical attack chains, producing actionable findings.

Understanding MITRE ATT&CK matrices

ATT&CK organizes adversary behavior into a hierarchy of tactics, techniques, and procedures. Tactics represent the attacker's objective (like gaining initial access or escalating privileges). Techniques describe the methods and procedures used to achieve that objective. Procedures document the specific tools and implementation details observed in the wild.

Three matrices address different operational environments:

  • Enterprise: Covers traditional IT environments including Windows, macOS, Linux, cloud platforms (IaaS, SaaS, Azure AD, Google Workspace), containers, and network devices

  • Mobile: Addresses threats targeting iOS and Android devices

  • ICS: Focuses on industrial control systems and operational technology networks

Most cloud security teams work primarily with the Enterprise matrix, which includes dedicated technique coverage for cloud-specific attack patterns.

The Enterprise matrix has seven platform- and operating system–specific categories that focus on:

  • Cloud and SaaS environments like SaaS, IaaS, Azure AD, Office 365, and Google Workspace

  • Operating systems like Windows, macOS, and Linux

  • Network and container environments like network devices and container technologies

  • PRE-ATT&CK techniques like preparedness activities before initiating access

What tactics does MITRE ATT&CK list?

The following is a breakdown of the 14 attack tactics, from recon to impact, in the Enterprise matrix:

TacticDescription
ReconnaissanceCollecting data about a potential victim
Resource developmentGathering resources for a potential attack
Initial accessBreaching a network for the first time
ExecutionInjecting malicious code into the victim’s network and other adversary-controlled code
PersistenceGaining a foothold in the victim’s IT environment
Privilege escalationSecuring higher access privileges
Defense evasionSidestepping security mechanisms
Credential accessStealing credentials from legitimate accounts
DiscoveryExploring various components of a victim’s network
Lateral movementMoving across a victim’s IT environment
CollectionCollecting sensitive enterprise data
Command and controlCommunicating with compromised systems, like hijacked incidents
ExfiltrationStealing sensitive data from enterprises
ImpactDamaging enterprise IT environments

What are the techniques in MITRE ATT&CK?

There are too many MITRE ATT&CK techniques and sub-techniques to explore in a single post—the Enterprise matrix alone features 203 techniques and 453 sub-techniques.

Below are a few examples of techniques for each of the 14 Enterprise tactics:

TacticExample techniqueDetection
ReconnaissanceActive Scanning (T1595)Monitor for unusual inbound traffic targeting exposed cloud services (like S3, EC2, or Load Balancers).
Resource DevelopmentAcquire Infrastructure (T1583)Track domain registration, new external IPs, and rogue cloud accounts impersonating your org.
Initial AccessValid Accounts (T1078)Look for logins from unfamiliar geolocations or impossible travel times using identity and access management (IAM) credentials.
ExecutionUser Execution (T1204)Detect suspicious command execution or script activity in containers and VMs that external users trigger.
PersistenceCreate Cloud Account (T1136.003)Monitor new IAM user or role creation outside of expected provisioning pipelines.
Privilege EscalationAbuse Elevation Control (T1548)Flag unauthorized use of sudo or admin privileges within cloud workloads or CI/CD pipelines.
Defense EvasionImpair Defenses (T1562)Detect disabled cloud logging services (like CloudTrail, Azure Monitor or GCP Logging).
Credential AccessSteal Application Access Token (T1528)Alert on suspicious access token usage across services or anomalous API calls using tokens.
DiscoveryCloud Service Discovery (T1526)Look for enumeration activity targeting APIs, metadata endpoints, or cloud asset inventories.
Lateral MovementRemote Services (T1021)Track unexpected lateral SSH or API access across VPCs, accounts, or projects.
CollectionData from Cloud Storage (T1530)Monitor access to sensitive buckets or blobs—especially from temporary credentials or external IPs.
Command & Control (C2)Application Layer Protocol (T1071)Detect the use of common protocols (like HTTPS) in unusual patterns (such as timing, volume, or destinations).
ExfiltrationExfiltration Over Web Service (T1567)Track abnormal data movement to external SaaS or cloud storage services from internal workloads.
ImpactData Destruction (T1485)Detect mass deletion activity in production storage (like S3 or Azure Blobs) or critical databases.

How is MITRE ATT&CK different from Cyber Attack Chain?

The Cyber Kill Chain, published by Lockheed Martin in 2011, models attacks as a linear sequence of seven phases from reconnaissance through actions on objectives. MITRE ATT&CK takes a different approach: it maps techniques without assuming a fixed order, recognizing that real attacks often skip phases, loop back, or execute multiple tactics simultaneously.

For detection engineering, this distinction matters. Kill Chain helps you understand attack progression conceptually, but ATT&CK gives you the technique-level granularity needed to build and map specific detections.

MITRE ATTACKCyber Attack Chain
Features 14 Enterprise tactics, 12 Mobile tactics, and 12 ICS tacticsFeatures seven tactics: reconnaissance, weaponization, delivery, exploitation, installation, C2, and actions on objectives
Doesn’t establish or presuppose that cyberattacks follow a particular sequenceStates that all attacks feature the same sequence of tactics
Doesn’t focus on linear sequences but does emphasize hierarchies of tactics, techniques, and proceduresLinearly anatomizes cyberattacks but doesn’t offer hierarchical breakdowns
Focuses on how cyber adversaries facilitate attacks, why they do so, and with what toolsLacks techniques, subtechniques, and procedures and instead focuses on a step-by-step breakdown of adversarial behavior
Provides a source for enterprises to establish protective measures across the cyberattack lifecycleIs more useful in the initial stages of a threat detection process
Features regular updates and improvements from numerous cybersecurity expertsDoesn’t feature many iterative improvements or community-led contributions
Provides a toolkit for users to design remediation and mitigation playbooksDoesn’t offer any in-depth mitigation strategies that businesses can apply to ward off cyberattacks

How Wiz and MITRE ATT&CK can defend your cloud environments

Wiz integrates MITRE ATT&CK directly into cloud detection and response workflows. When an alert fires, Wiz maps it to the relevant ATT&CK technique, showing analysts exactly which tactic is in play and what the attacker likely intended. This context accelerates triage because responders immediately understand where the activity fits in the attack lifecycle.

For proactive defense, Wiz continuously assesses your environment against the MITRE ATT&CK Cloud Matrix, surfacing which techniques lack detection coverage. Security teams can then prioritize detection engineering efforts based on which gaps pose the greatest risk to their specific cloud environment.

Wiz Defend extends this capability with cross-layer correlation, connecting cloud control plane events with runtime signals to provide the full attack story. The result is faster mean time to investigate and confidence that you're addressing the threats that matter most.

Ready to see how ATT&CK mapping works in practice? Get a demo to explore Wiz's cloud threat detection capabilities.

Find the Gaps in Your ATT&CK Coverage

Get a demo to see how Wiz maps your detections and security controls against the MITRE ATT&CK cloud matrix, so you know exactly where you're exposed.

Pour plus d’informations sur la façon dont Wiz traite vos données personnelles, veuillez consulter notre Politique de confidentialité.

Frequently asked questions about MITRE ATT&CK