top of page

Cybersecurity and MITRE ATT&CK®

Updated: Jan 30


We recommend regular testing and verification of your organization's security and cyber security posture based on cyber attackers' strategies, techniques, and procedures as mapped in MITRE ATT&CK® for Enterprise.


Here's what to do:


1. Select the category (e.g., persistence or privilege escalation) and the technique or techniques listed in MITRE ATT&CK® for Enterprise 


2. Compare your security technology and security to that described in this technique or techniques.


3. Real-test your technology and security against this technique or techniques.


4. Comprehensively analyse the performance of your detection and prevention technologies based on such a test.


5. Apply the test outputs and make appropriate adjustments and upgrades to your security processes and technologies.


We recommend repeating it for other techniques listed in each category of MITRE ATT&CK® for Enterprise.

Comments


bottom of page