ATT&CK Tactics
Digital Mosquitoes
MITRE ATT&CK stands for MITRE Adversarial Tactics, Techniques, and Common Knowledge. Adversaries typically deploy attacks that generally fall into the large categories in the real world. MITRE ATT&CK provides a common framework for experts in cybersecurity to manage.
Zetafence(TM) leverages the MITRE ATT&CK framework to classify security scan findings, aligning them with real-world adversary tactics, techniques, and common knowledge (TTPs). This enables organizations to prioritize vulnerabilities based on their potential impact and understand the threat landscape more effectively. Zetafence employs a sophisticated Security Scanning classification service that leverages the MITRE ATT&CK framework.
Tactics are are the goals that adversaries are trying to achieve. Think of them as the “what” of an attack.
MITRE ATT&CK Tactic | Description |
---|---|
Initial Access | Gain initial access to a system or network |
Execution | Execute code on a victim system |
Persistence | Establish persistence within a system to access later |
Privilege Escalation | Attempt to obtain higher privileges on a system |
Defense Evasion | Evade detection and deceive defenders |
Credential Access | Gain access to credentials |
Discovery | Gather information about the system or network to move laterally |
Lateral Movement | Move laterally within a network to achieve their objectives |
Collection | Collect data from compromised systems |
Collection | Collect data from compromised systems |
Command and Control (C2) | Maintain communication channels with compromised systems. |
Exfiltration | Collect data from compromised systems |
Impact | Take actions that affect the availability, integrity, or confidentiality of systems or data |