Sign Up for Our Newsletter
* indicates required

Top Five MITRE ATT&CK Framework Use Cases

Last month, we published a list of the top five use cases for the MITRE ATT&CK framework, a library of tactics and techniques that specify actions that an attacker may take. In no particular order, the MITRE ATT&CK framework can be used for Red Teams, Blue Teams, vendor bake-offs, breach and attack simulations, and remediation of security gaps.


The following paragraph is taken from the AlienVault blog:

ATT&CK incorporates what MITRE calls Tactics and Techniques to describe adversarial actions and behaviors. Techniques are specific actions an attacker might take, and tactics are phases of attacker behavior. At Threatcare, we’ve watched the steady adoption of the ATT&CK framework over the years. We’ve also seen innovative cybersecurity professionals use the framework in ways that have surprised the MITRE team.

— Marcus Carey, CEO


AlienVault works with over 7,000 customers to deliver the best threat detection and response. They developed the Open Threat Exchange, the world’s largest crowd-sourced computer-security platform.

The MITRE ATT&CK framework was developed by MITRE to be a globally accessible knowledge base to solve problems for a safer world. Their real-world observations are applicable to the private sector, in government, and in the cybersecurity product and service community. ATT&CK is open and available to any person or organization for use at no charge.


You can also see how Threatcare maps to the MITRE ATT&CK framework by downloading our MITRE ATT&CK Matrix.

To find out how you can leverage a solution like Threatcare, check out this Breach and Attack Simulation Guide written by Mike Ripp.

Threatcare creates Breach and Attack Simulation software for humans.