MITRE ATT&CK stands for MITRE Adversarial Tactics, Techniques, and Common Knowledge. Adversaries typically deploy attacks that generally fall into the large categories in the real world. MITRE ATT&CK provides a common framework for experts in cybersecurity to manage.

Zetafence(TM) leverages the MITRE ATT&CK framework to classify security scan findings, aligning them with real-world adversary tactics, techniques, and common knowledge (TTPs). This enables organizations to prioritize vulnerabilities based on their potential impact and understand the threat landscape more effectively. Zetafence employs a sophisticated Security Scanning classification service that leverages the MITRE ATT&CK framework.

Tactics are are the goals that adversaries are trying to achieve. Think of them as the “what” of an attack.

MITRE ATT&CK TacticDescription
Initial AccessGain initial access to a system or network
ExecutionExecute code on a victim system
PersistenceEstablish persistence within a system to access later
Privilege EscalationAttempt to obtain higher privileges on a system
Defense EvasionEvade detection and deceive defenders
Credential AccessGain access to credentials
DiscoveryGather information about the system or network to move laterally
Lateral MovementMove laterally within a network to achieve their objectives
CollectionCollect data from compromised systems
CollectionCollect data from compromised systems
Command and Control (C2)Maintain communication channels with compromised systems.
ExfiltrationCollect data from compromised systems
ImpactTake actions that affect the availability, integrity, or confidentiality of systems or data