{"id":50772,"date":"2024-12-23T08:07:32","date_gmt":"2024-12-23T15:07:32","guid":{"rendered":"https:\/\/www.syteca.com\/?post_type=glossary&#038;p=50772"},"modified":"2024-12-23T09:33:29","modified_gmt":"2024-12-23T16:33:29","slug":"what-is-the-mitre-attck-framework","status":"publish","type":"glossary","link":"https:\/\/www.syteca.com\/en\/glossary\/what-is-the-mitre-attck-framework","title":{"rendered":"What Is the MITRE ATT&amp;CK Framework?"},"content":{"rendered":"\n<p>The <a href=\"https:\/\/attack.mitre.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">MITRE ATT&amp;CK framework<\/a> has become an essential knowledge base in cybersecurity as a structured way to understand and respond to the latest cyber threats. This comprehensive framework can help organizations strengthen their cybersecurity strategies by providing a detailed understanding of adversary tactics, techniques, and procedures.<\/p>\n\n\n\n<p>In this post, we explore the definition of \u201cMITRE ATT&amp;CK\u201d, the core components of this framework, and how it can help you fortify your organization\u2019s cybersecurity.&nbsp;<\/p>\n\n\n\n<h2  class=\"wp-block-heading\">What is the MITRE ATT&amp;CK framework?<\/h2>\n\n\n\n<p>The<strong><em> adversarial tactics, techniques, and common knowledge (ATT&amp;CK)<\/em><\/strong> framework was introduced in 2013 by MITRE, a non-profit organization that aims to support the public interest by addressing significant national challenges. Based on real-world observations, the framework provides detailed descriptions of tactics, techniques, and procedures used by cyber attackers.&nbsp;<\/p>\n\n\n\n<p>Initially, the ATT&amp;CK framework focused only on Windows-based threats. However, over time MITRE continuously expanded it to provide valuable insights for all major platforms. Now, the framework also covers mobile threats and can be subdivided into three matrices associated with different subject matters.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"825\" height=\"264\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/23075341\/graphics-1-What-Is-the-Mitre-ATTCK-Framework.svg\" alt=\"MITRE ATT&amp;CK definition\" class=\"wp-image-50773\"\/><\/figure>\n\n\n\n<h2  class=\"wp-block-heading\">Why is the MITRE ATT&amp;CK framework important?<\/h2>\n\n\n\n<p>The MITRE ATT&amp;CK framework enables organizations to understand cyber attackers from the inside out. The framework covers various adversary behaviors, explaining numerous tactics and techniques based on real-world observations of malicious activities.&nbsp;<\/p>\n\n\n\n<p>The MITRE ATT&amp;CK framework can help you build more resilient security systems, improve detection and response strategies, and ensure your organization can handle modern cyber threats.<\/p>\n\n\n\n<p>MITRE continuously solicits feedback and contributions from cybersecurity practitioners worldwide, ensuring that the framework remains up-to-date and reflects the latest adversarial tactics.&nbsp;<\/p>\n\n\n\n<h2  class=\"wp-block-heading\">Core components of the MITRE ATT&amp;CK framework<\/h2>\n\n\n\n<p>The MITRE ATT&amp;CK framework comprises three main components: tactics, techniques, and procedures.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Tactics<\/h3>\n\n\n\n<p>These construe the<em> why <\/em>of an attack, representing the goals that cybercriminals want to achieve during adversary actions. MITRE attack tactics are organized into stages that outline the typical sequence of actions attackers may take. Each tactic defines a particular objective in the MITRE attack chain, illustrating what the attacker aims to accomplish at each stage.&nbsp;<\/p>\n\n\n\n<p>For instance, within the Enterprise matrix, there are 14 tactics that cyberattackers use:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"825\" height=\"547\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/23075408\/graphics-2-What-Is-the-Mitre-ATTCK-Framework.svg\" alt=\"MITRE ATT&amp;CK Enterprise tactics\" class=\"wp-image-50780\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Techniques<\/h3>\n\n\n\n<p>Techniques describe the<em> how<\/em> of an attack, specifying the methods cybercriminals use to apply each tactic and achieve their objectives. Techniques can be further subdivided into sub-techniques. For example, email fishing attacks are one technique that could be used when applying the \u201cinitial access\u201d tactic.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Procedures<\/h3>\n\n\n\n<p>Procedures show examples of how cybercriminals may employ certain techniques in their malicious operations. Based on real-world attacks, they demonstrate how specific techniques were implemented step-by-step.&nbsp;<\/p>\n\n\n\n<p>These procedures provide a thorough explanation of each method, helping security officers understand <a href=\"\/en\/blog\/mitre-attack-mitigate-cyber-attacks\" target=\"_blank\" rel=\"noreferrer noopener\">the practical application of the techniques<\/a> and take appropriate preventive measures.<\/p>\n\n\n\n<h2  class=\"wp-block-heading\">Key use cases of MITRE ATT&amp;CK framework<\/h2>\n\n\n\n<p>You can utilize the MITRE ATT&amp;CK framework for:<\/p>\n\n\n\n\t\t<div  class=\"block-5df4dbde-8f19-4b5f-9e9e-979bc60c9e15 areoi-element container template-16 px-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center text-26-22 p-poppins\" style=\"font-style:normal;font-weight:600\">Applications of the MITRE ATT&amp;CK framework<\/p>\n\n\n\n\t\t<div  class=\"block-a57e94b1-806c-48f6-ad84-92bc82a18cd0 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-50cc948d-8398-4e88-8053-521874815a45 col areoi-element col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-5dcf9cb4-a50d-4935-817c-d526f996b1ee areoi-element rounded-bg-13px h-100\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-4022e4d9-f2d8-4e6f-81e2-9b027e7adec8 row areoi-element h-100\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-47af660c-01c1-4f57-a16a-ed7622789879 col areoi-element ps-lg-0 ps-xl-3 align-self-center col-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mt-2 has-text-color\" style=\"color:#4790ea4d;font-size:3.5rem;font-style:normal;font-weight:700\">01<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-113de618-d816-4dcb-ace7-c9211674a8c2 col areoi-element ps-3 ps-md-0 ps-lg-3 align-self-center col-9 col-xxl-10\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins mb-0 ps-xl-4\" style=\"font-size:1.25rem;font-style:normal;font-weight:600\">Security gap analysis<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-eb0d1df7-b98a-4b4f-8512-ac14885739fa col areoi-element col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-3e47e8c0-fe0a-47c7-9166-d40171c64882 areoi-element rounded-bg-13px h-100\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-73fc59e5-3d7f-4c9f-b64f-042dbe690338 row areoi-element h-100\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-a1f82fc9-5502-4dce-a4d7-9a387a360328 col areoi-element ps-lg-0 ps-xl-3 align-self-center col-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mt-2 has-text-color\" style=\"color:#4790ea4d;font-size:3.5rem;font-style:normal;font-weight:700\">02<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-4fa6114a-9ce3-4f3b-95a0-3b432dfcb44c col areoi-element ps-3 ps-md-0 ps-lg-3 align-self-center col-9 col-xxl-10\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins mb-0 ps-xl-4\" style=\"font-size:1.25rem;font-style:normal;font-weight:600\">Threat prevention<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-10fe056a-7e7c-44e9-aba9-9f83e5a90e1a col areoi-element col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-2d38d511-c6da-4e19-a2b7-8831b29da7ad areoi-element rounded-bg-13px h-100\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-18a9a1ce-aeb0-4413-be29-f4fec1f1f0ce row areoi-element h-100\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-28b65d60-204d-4a65-8f63-87a7e22b28e0 col areoi-element ps-lg-0 ps-xl-3 align-self-center col-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mt-2 has-text-color\" style=\"color:#4790ea4d;font-size:3.5rem;font-style:normal;font-weight:700\">03<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-2d734441-aaa7-44c3-a11c-0752154d012d col areoi-element ps-3 ps-md-0 ps-lg-3 align-self-center col-9 col-xxl-10\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins mb-0 ps-xl-4\" style=\"font-size:1.25rem;font-style:normal;font-weight:600\">Incident response<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-e2789fee-cdd2-4e54-b827-d7304e2a75bc col areoi-element\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-33424547-4882-4dca-903f-67e64be58ebd areoi-element rounded-bg-13px h-100\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-4a9eb362-4312-4550-a696-a4755ae9bf9e row areoi-element h-100\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-3db486bf-2ffd-4663-9e79-99d7dacef426 col areoi-element ps-lg-0 ps-xl-3 align-self-center col-3 col-xxl-2\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mt-2 has-text-color\" style=\"color:#4790ea4d;font-size:3.5rem;font-style:normal;font-weight:700\">04<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-cdfcca69-6197-48e1-9cf6-b09c254d1f54 col areoi-element ps-3 ps-md-0 ps-lg-3 align-self-center col-9 col-xxl-10\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins mb-0 ps-xl-4\" style=\"font-size:1.25rem;font-style:normal;font-weight:600\">Security awareness training<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p><strong>Security gap analysis.<\/strong> The ATT&amp;CK framework can be employed to simulate real-world techniques used by cybercriminals, thus getting a realistic assessment of your defenses. Based on the results of your assessments, you can take appropriate measures to mitigate security gaps and refine your overall cybersecurity strategy.<\/p>\n\n\n\n<p><strong>Threat prevention.<\/strong> The MITRE ATT&amp;CK framework can make you aware of the malicious tactics most relevant to your industry, letting you take targeted preventive security measures. For example, if credential stuffing is a common threat in your industry, you can develop alerts specifically for these behaviors.<\/p>\n\n\n\n<p><strong>Incident response<\/strong>. Since the framework provides a detailed matrix of adversary tactics and techniques, it can help you anticipate adversary behavior. The framework aids in identifying the methods used during an attack, enabling you to detect, mitigate, and remediate threats more efficiently.&nbsp;<\/p>\n\n\n\n<p><strong>Security awareness training. <\/strong>The MITRE ATT&amp;CK framework is excellent for educating your cybersecurity team about existing adversary tactics and techniques. By using the framework as your reference point for discussing cyber threats and mitigation strategies, you can enhance your training and awareness programs.<\/p>\n\n\n\n<p>To sum up, the MITRE ATT&amp;CK framework is a powerful tool for understanding and minimizing cyber threats. You can leverage this framework to fortify your cybersecurity measures, better protect your sensitive data, and ensure you are well-prepared for the evolving cyber threats.&nbsp;<\/p>\n\n\n\n<p><a href=\"\/en\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Syteca<\/strong><\/a> is a comprehensive cybersecurity platform that complements the MITRE ATT&amp;CK framework. With advanced <a href=\"\/en\/product\/identity-management\" target=\"_blank\" rel=\"noreferrer noopener\">identity<\/a> and <a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">privileged access management<\/a> functionalities, Syteca is capable of defending against many adversarial techniques. Syteca\u2019s granular tools for <a href=\"\/en\/product\/user-activity-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">user activity monitoring<\/a> grant you full visibility into your network, while real-time <a href=\"\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noreferrer noopener\">incident response<\/a> allows you to put a halt to suspicious actions and disable compromised accounts on the spot.<\/p>\n\n\n\n\t\t<div  class=\"block-ed4ea255-87b6-4b14-8bdd-cabf90083688 areoi-element container pattern-request-demo-2 rounded-bg-13px\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(71, 144, 235,0.15)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-f0efcff9-cdb2-4632-a014-0b190201ec80 row areoi-element align-items-center row-cols-md-2\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-9e962fe6-f77f-40f9-898c-abaef3f48ccb col areoi-element d-flex flex-wrap flex-column align-items-center align-items-md-start col-md-6\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-left p-poppins pt-3 text-center text-md-start lh-sm has-text-color\" style=\"color:#1a3b4e;font-size:1.75rem;font-style:normal;font-weight:600\">Want to try Syteca? Request access<br>to the online demo!<\/p>\n\n\n\n<p class=\"has-text-align-left p-poppins pb-3 text-center text-md-start\" style=\"font-style:normal;font-weight:500\">See why clients from 70+ countries already use Syteca.<\/p>\n\n\n\n\t\t\t\t\n\t\t<button data-bs-target=\"#hsModal-demo\" data-bs-toggle=\"modal\" \n\t\t\t\n\t\t\tclass=\"block-9170fdac-8fec-4c73-a86c-338093dbf9d9 btn areoi-has-url position-relative me-lg-2  me-md-2 me-sm-2 me-lg-4 mb-3 hsBtn-demo btn-info  btn-info\"\n\t >\n\t\t\t\t\t\n\t\t\t\t\tAccess the Demo Portal \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/button>\n\t\t\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f840f051-f300-4ade-9e70-68d6c65e619d col areoi-element col-md-6 d-none d-sm-none d-md-block\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"369\" height=\"248\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/02014220\/Group-584.png\" alt=\"\" class=\"wp-image-24868\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/02014220\/Group-584.png 369w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/02014220\/Group-584-300x202.png 300w\" sizes=\"(max-width: 369px) 100vw, 369px\" \/><\/figure>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t","protected":false},"featured_media":50801,"menu_order":0,"template":"","class_list":["post-50772","glossary","type-glossary","status-publish","has-post-thumbnail","hentry","glossary_category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Is the Mitre ATT&amp;CK Framework? | Syteca<\/title>\n<meta name=\"description\" content=\"What is the MITRE ATT&amp;CK framework? Discover our guide to threat evaluations and mapping adversary tactics. \u2705 Read this post to explore how the framework can enhance your cybersecurity strategy.\u25b6\ufe0f\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.syteca.com\/en\/glossary\/what-is-the-mitre-attck-framework\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is the Mitre ATT&amp;CK Framework? | Syteca\" \/>\n<meta property=\"og:description\" content=\"What is the MITRE ATT&amp;CK framework? Discover our guide to threat evaluations and mapping adversary tactics. \u2705 Read this post to explore how the framework can enhance your cybersecurity strategy.\u25b6\ufe0f\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.syteca.com\/en\/glossary\/what-is-the-mitre-attck-framework\" \/>\n<meta property=\"og:site_name\" content=\"Syteca\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-23T16:33:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/23080556\/OG-What-Is-the-Mitre-ATTCK-Framework.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/23080607\/OG-TW-What-Is-the-Mitre-ATTCK-Framework.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-the-mitre-attck-framework\",\"url\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-the-mitre-attck-framework\",\"name\":\"What Is the Mitre ATT&CK Framework? | Syteca\",\"isPartOf\":{\"@id\":\"https:\/\/www.syteca.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-the-mitre-attck-framework#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-the-mitre-attck-framework#primaryimage\"},\"thumbnailUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/23093324\/banner-What-Is-the-Mitre-ATTCK-Framework.jpg\",\"datePublished\":\"2024-12-23T15:07:32+00:00\",\"dateModified\":\"2024-12-23T16:33:29+00:00\",\"description\":\"What is the MITRE ATT&CK framework? Discover our guide to threat evaluations and mapping adversary tactics. \u2705 Read this post to explore how the framework can enhance your cybersecurity strategy.\u25b6\ufe0f\",\"breadcrumb\":{\"@id\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-the-mitre-attck-framework#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.syteca.com\/en\/glossary\/what-is-the-mitre-attck-framework\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-the-mitre-attck-framework#primaryimage\",\"url\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/23093324\/banner-What-Is-the-Mitre-ATTCK-Framework.jpg\",\"contentUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/23093324\/banner-What-Is-the-Mitre-ATTCK-Framework.jpg\",\"width\":1920,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-the-mitre-attck-framework#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Glossary\",\"item\":\"https:\/\/www.syteca.com\/en\/glossary\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\/\/www.syteca.com\/en\/glossary-category\/security\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What Is the MITRE ATT&amp;CK Framework?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.syteca.com\/en\/#website\",\"url\":\"https:\/\/www.syteca.com\/en\/\",\"name\":\"Syteca\",\"description\":\"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.syteca.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is the Mitre ATT&CK Framework? | Syteca","description":"What is the MITRE ATT&CK framework? Discover our guide to threat evaluations and mapping adversary tactics. \u2705 Read this post to explore how the framework can enhance your cybersecurity strategy.\u25b6\ufe0f","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.syteca.com\/en\/glossary\/what-is-the-mitre-attck-framework","og_locale":"en_US","og_type":"article","og_title":"What Is the Mitre ATT&CK Framework? | Syteca","og_description":"What is the MITRE ATT&CK framework? Discover our guide to threat evaluations and mapping adversary tactics. \u2705 Read this post to explore how the framework can enhance your cybersecurity strategy.\u25b6\ufe0f","og_url":"https:\/\/www.syteca.com\/en\/glossary\/what-is-the-mitre-attck-framework","og_site_name":"Syteca","article_modified_time":"2024-12-23T16:33:29+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/23080556\/OG-What-Is-the-Mitre-ATTCK-Framework.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/23080607\/OG-TW-What-Is-the-Mitre-ATTCK-Framework.jpg","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.syteca.com\/en\/glossary\/what-is-the-mitre-attck-framework","url":"https:\/\/www.syteca.com\/en\/glossary\/what-is-the-mitre-attck-framework","name":"What Is the Mitre ATT&CK Framework? | Syteca","isPartOf":{"@id":"https:\/\/www.syteca.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.syteca.com\/en\/glossary\/what-is-the-mitre-attck-framework#primaryimage"},"image":{"@id":"https:\/\/www.syteca.com\/en\/glossary\/what-is-the-mitre-attck-framework#primaryimage"},"thumbnailUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/23093324\/banner-What-Is-the-Mitre-ATTCK-Framework.jpg","datePublished":"2024-12-23T15:07:32+00:00","dateModified":"2024-12-23T16:33:29+00:00","description":"What is the MITRE ATT&CK framework? Discover our guide to threat evaluations and mapping adversary tactics. \u2705 Read this post to explore how the framework can enhance your cybersecurity strategy.\u25b6\ufe0f","breadcrumb":{"@id":"https:\/\/www.syteca.com\/en\/glossary\/what-is-the-mitre-attck-framework#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.syteca.com\/en\/glossary\/what-is-the-mitre-attck-framework"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.syteca.com\/en\/glossary\/what-is-the-mitre-attck-framework#primaryimage","url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/23093324\/banner-What-Is-the-Mitre-ATTCK-Framework.jpg","contentUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/23093324\/banner-What-Is-the-Mitre-ATTCK-Framework.jpg","width":1920,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.syteca.com\/en\/glossary\/what-is-the-mitre-attck-framework#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Glossary","item":"https:\/\/www.syteca.com\/en\/glossary"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.syteca.com\/en\/glossary-category\/security"},{"@type":"ListItem","position":3,"name":"What Is the MITRE ATT&amp;CK Framework?"}]},{"@type":"WebSite","@id":"https:\/\/www.syteca.com\/en\/#website","url":"https:\/\/www.syteca.com\/en\/","name":"Syteca","description":"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.syteca.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/glossary\/50772","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/types\/glossary"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media\/50801"}],"wp:attachment":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media?parent=50772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}