Back
MITRE ATT&CK Framework
webattack.mitre.org·attack.mitre.org/
MITRE ATT&CK is the industry-standard taxonomy for cyber adversary behavior; relevant to AI safety for evaluating AI-enabled offensive capabilities, red-teaming AI systems, and informing threat models for AI deployment security.
Metadata
Importance: 55/100tool pagereference
Summary
MITRE ATT&CK is a globally accessible, open knowledge base cataloging adversary tactics and techniques based on real-world observations. It provides a structured matrix of attack behaviors across enterprise, mobile, and ICS environments, used by defenders, researchers, and policymakers to build threat models and improve cybersecurity defenses.
Key Points
- •Comprehensive taxonomy of adversary tactics (14 for Enterprise) and hundreds of techniques/sub-techniques derived from real-world intrusions
- •Used as a standard reference framework by private sector, government, and cybersecurity product communities for threat modeling
- •Covers the full attack lifecycle from Reconnaissance through Impact, enabling systematic gap analysis in defenses
- •Free and open resource maintained by MITRE, with community contribution mechanisms and regular updates
- •Relevant to AI security as a reference for evaluating offensive capabilities of AI systems and red-teaming AI-enabled attacks
Cited by 2 pages
| Page | Type | Quality |
|---|---|---|
| AI Misuse Risk Cruxes | Crux | 65.0 |
| AI Risk Warning Signs Model | Analysis | 70.0 |
Cached Content Preview
HTTP 200Fetched Mar 20, 202671 KB

| | |
| --- | --- |
| [Get Started](https://attack.mitre.org/resources/) | [Take a Tour](https://attack.mitre.org/#) |
| [Contribute](https://attack.mitre.org/resources/engage-with-attack/contribute) | [Blog ](https://medium.com/mitre-attack) |
| [FAQ](https://attack.mitre.org/resources/faq) | [Random Page](https://attack.mitre.org/#)Toggle DropdownToggle Dropdown<br>[Matrix](https://attack.mitre.org/#) [Tactic](https://attack.mitre.org/#) [Technique](https://attack.mitre.org/#) [Data Source](https://attack.mitre.org/#) [Mitigation](https://attack.mitre.org/#) [Group](https://attack.mitre.org/#) [Software](https://attack.mitre.org/#) [Campaign](https://attack.mitre.org/#) [Asset](https://attack.mitre.org/#) |
MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community.
With the creation of ATT&CK, MITRE is fulfilling its mission to solve problems for a safer world — by bringing communities together to develop more effective cybersecurity. ATT&CK is open and available to any person or organization for use at no charge.
## ATT&CK Matrix for Enterprise
layout: side
[flat](https://attack.mitre.org/#)
show sub-techniqueshide sub-techniques
| [Reconnaissance](https://attack.mitre.org/tactics/TA0043 "") | [Resource Development](https://attack.mitre.org/tactics/TA0042 "") | [Initial Access](https://attack.mitre.org/tactics/TA0001 "") | [Execution](https://attack.mitre.org/tactics/TA0002 "") | [Persistence](https://attack.mitre.org/tactics/TA0003 "") | [Privilege Escalation](https://attack.mitre.org/tactics/TA0004 "") | [Defense Evasion](https://attack.mitre.org/tactics/TA0005 "") | [Credential Access](https://attack.mitre.org/tactics/TA0006 "") | [Discovery](https://attack.mitre.org/tactics/TA0007 "") | [Lateral Movement](https://attack.mitre.org/tactics/TA0008 "") | [Collection](https://attack.mitre.org/tactics/TA0009 "") | [Command and Control](https://attack.mitre.org/tactics/TA0011 "") | [Exfiltration](https://attack.mitre.org/tactics/TA0010 "") | [Impact](https://attack.mitre.org/tactics/TA0040 "") |
| --- | --- | --- | --- | --- | --- | --- | --- | --- | --- | --- | --- | --- | --- |
| 11 techniques | 8 techniques | 11 techniques | 17 techniques | 23 techniques | 14 techniques | 47 techniques | 17 techniques | 34 techniques | 9 techniques | 17 techniques | 18 techniques | 9 techniques | 15 techniques |
| --- | --- | --- | --- | --- | --- | --- | --- | --- | --- | --- | --- | --- | --- |
| | |
| --- |
| [Active Scanning (3)](https://attack.mitre.org/techniques/T1595 "") |
| [Scanning IP Blocks](https://attack.mitre.org/techniques
... (truncated, 71 KB total)Resource ID:
4c2168269b12c393 | Stable ID: OTA3YWQ5OT