top of page

Cybersecurity and MITRE ATT&CK®

Updated: Jan 30

We recommend regular testing and verification of your organization's security and cyber security posture based on cyber attackers' strategies, techniques, and procedures as mapped in MITRE ATT&CK® for Enterprise.

Here's what to do:

1. Select the category (e.g., persistence or privilege escalation) and the technique or techniques listed in MITRE ATT&CK® for Enterprise 

2. Compare your security technology and security to that described in this technique or techniques.

3. Real-test your technology and security against this technique or techniques.

4. Comprehensively analyse the performance of your detection and prevention technologies based on such a test.

5. Apply the test outputs and make appropriate adjustments and upgrades to your security processes and technologies.

We recommend repeating it for other techniques listed in each category of MITRE ATT&CK® for Enterprise.


bottom of page