
What Is the MITRE ATT&CK Framework?
The MITRE ATT&CK framework is a globally accessible knowledge base that documents adversary tactics, techniques, and procedures (TTPs) observed in real-world cyberattacks. Created by MITRE Corporation—a federally funded research and development center—and first released in 2013, it provides a standardized taxonomy covering 14 tactical categories and 273+ specific attack techniques across enterprise, mobile, and industrial control system environments.
For small and medium-sized businesses, ATT&CK offers a practical roadmap to understand exactly how attackers operate—from initial reconnaissance and social engineering through final data encryption. Unlike abstract security guidelines, ATT&CK maps specific attack methods to defensive controls, enabling businesses to implement targeted defenses at each attack stage without requiring enterprise-level budgets.
Whether you're a tax professional navigating IRS Publication 4557 cybersecurity requirements or a healthcare provider securing patient data under HIPAA's Security Rule, this framework provides the tactical intelligence needed to defend against modern cyber threats. This guide explains how small business owners can use MITRE ATT&CK to build effective, budget-conscious cybersecurity defenses starting at under $200 per month, with practical implementation steps and measurable security outcomes.
Cybersecurity By The Numbers
IBM Cost of Data Breach Report 2024
Verizon 2024 Data Breach Investigations Report
Sophos State of Ransomware 2024
Why Small Businesses Need MITRE ATT&CK
Small and medium-sized businesses face the same sophisticated attack techniques as Fortune 500 companies, but typically lack enterprise-level security budgets and dedicated security teams. The MITRE ATT&CK framework levels the playing field by providing free, actionable intelligence about exactly how attackers operate—enabling SMBs to implement targeted defenses against the specific techniques threat actors use.
Unlike compliance frameworks that tell you what to protect, ATT&CK shows you how attackers will try to compromise your systems. This tactical knowledge allows you to prioritize security investments based on real-world threat intelligence rather than vendor marketing claims. Most small businesses using only traditional antivirus software cover fewer than 30% of ATT&CK techniques. Adding Endpoint Detection and Response (EDR), email security, and multi-factor authentication (MFA) increases coverage to 60–70% of high-priority techniques.
For tax professionals subject to IRS Written Information Security Plan (WISP) requirements, ATT&CK provides concrete evidence of risk assessment and documents which specific attack techniques your security controls address—satisfying the risk analysis component of a compliant WISP.
Understanding the MITRE ATT&CK Framework Structure
The MITRE ATT&CK framework organizes cyberattack methods into a matrix structure with two primary components: tactics (the adversary's tactical objectives) and techniques (the specific methods used to achieve those objectives). Each technique receives a unique identifier—such as T1566 for Phishing or T1059.001 for PowerShell—enabling precise communication between security teams, vendors, and threat intelligence sources.
Three Primary ATT&CK Matrices
MITRE maintains three matrices tailored to different technology environments. The Enterprise Matrix covers attacks against Windows, macOS, Linux, cloud platforms (AWS, Azure, GCP), and network infrastructure—containing 14 tactics and 273+ techniques as of version 18 (2025). The Mobile Matrix documents attacks against iOS and Android devices, including 14 tactics and 100+ mobile-specific techniques. The ICS Matrix addresses industrial control systems and operational technology environments with 11 tactics specific to manufacturing and critical infrastructure.
Small businesses typically focus on the Enterprise Matrix. The framework is maintained as an open-source resource at attack.mitre.org and receives regular updates reflecting current threat intelligence from government agencies, security vendors, and incident response teams worldwide. MITRE Corporation, a not-for-profit organization founded in 1958, ensures the framework stays aligned with real-world attacker behavior.
Each technique page includes detailed descriptions, real-world examples, detection guidance, and recommended mitigations—making ATT&CK a self-contained reference for both building defenses and validating them.
The Bottom Line on ATT&CK Structure
The Enterprise Matrix is where most small businesses start. It documents 14 tactics, 273+ techniques, and dozens of sub-techniques, each with specific detection and mitigation guidance. You don't need to cover every technique—focus on the 20–30 most commonly used against your industry first.
The 14 MITRE ATT&CK Tactics Explained for Small Businesses
Each tactic represents a distinct phase in the attack lifecycle. Understanding these phases helps small businesses implement layered defenses that catch attackers at multiple points before damage occurs.
1. Reconnaissance (TA0043)
Attackers gather information about your business through publicly available sources. They scan your website, enumerate employee email addresses from LinkedIn, identify technologies you use through job postings, and map your network infrastructure using tools like Shodan. Reconnaissance precedes the vast majority of targeted attacks, and attackers use this phase to craft convincing phishing emails and identify vulnerable entry points. Limiting public exposure of employee information, implementing web application firewalls, and conducting regular external security assessments all reduce your reconnaissance attack surface.
2. Resource Development (TA0042)
Adversaries establish infrastructure to support operations—purchasing domains that impersonate your company, setting up command-and-control servers, and developing or acquiring malware. While small businesses rarely detect this phase directly, monitoring for newly registered domains that spoof your brand is a practical early-warning capability that some DNS filtering services provide.
3. Initial Access (TA0001)
The adversary gains their first foothold through phishing emails, exploiting internet-facing vulnerabilities, or using stolen credentials. According to the 2024 Verizon Data Breach Investigations Report, 74% of breaches involve a human element—primarily credential theft and phishing. Initial Access is the most defensible phase: email security with anti-phishing capabilities mitigates T1566 (Phishing), while MFA on all remote access blocks T1078 (Valid Accounts) and T1133 (External Remote Services) even when credentials are stolen.
4. Execution (TA0002)
Attackers run malicious code using command-line interfaces, scripting engines like PowerShell, or legitimate system administration tools. EDR tools are essential here—they detect and block malicious script execution in real time, including the PowerShell-based techniques that appear in the majority of ransomware deployments. Restricting administrative privileges and enabling PowerShell Script Block Logging (a free Windows feature) add detection depth at no additional cost.
5. Persistence (TA0003)
Adversaries establish mechanisms to maintain access across system restarts, credential changes, and other interruptions—often using registry modifications, scheduled tasks, or newly created accounts. Persistent access allows attackers to return weeks or months after initial compromise, sometimes timing their reappearance to coincide with high-value periods like tax season. Monitoring Windows autoruns, reviewing scheduled tasks regularly, and deploying EDR with behavioral detection catch most persistence mechanisms early.
6. Privilege Escalation (TA0004)
Attackers gain higher-level permissions to access sensitive systems and data, moving from standard user accounts to administrator or domain admin credentials. Privilege escalation enables adversaries to disable security tools, access financial data, and deploy ransomware across entire networks. Aggressive patch management eliminates the exploitable vulnerabilities most commonly used for T1068 (Exploitation for Privilege Escalation), while Privileged Access Management (PAM) tools limit which accounts can perform administrative actions in the first place.
7. Defense Evasion (TA0005)
Adversaries avoid detection by disabling antivirus, obfuscating malware, or abusing trusted system utilities for malicious purposes. These techniques extend attacker dwell time—the period between initial compromise and detection—which allows more time for data collection and ransomware preparation. EDR with tamper protection, file integrity monitoring, and application control policies all counter common evasion techniques. For businesses that can't run a full security operations center, Managed Detection and Response (MDR) services provide the continuous monitoring needed to catch evasion attempts.
8. Credential Access (TA0006)
Attackers steal account credentials through keylogging, memory-based credential dumping (T1003 — OS Credential Dumping), or brute-force attacks against authentication systems. According to the IBM Cost of Data Breach Report, compromised credentials remain the most common initial attack vector at 19% of breaches. Enforcing MFA universally is the single highest-impact control for this tactic—stolen passwords become useless when a second factor is required. Pairing MFA with strong password policies and Windows Credential Guard closes most credential theft pathways for SMBs.
9. Discovery (TA0007)
Adversaries explore your environment to understand system configurations, network topology, user accounts, and valuable data locations. Discovery activity—unusual reconnaissance commands, unexpected network share enumeration, bulk account lookups—often generates detectable anomalies in system logs before attackers reach their final objectives. Network segmentation limits discovery scope, while honeypot accounts and files trigger alerts when accessed, providing early warning of active intrusions at minimal cost.
10. Lateral Movement (TA0008)
Attackers move through your network from the initially compromised system to other workstations and servers, seeking high-value targets like file servers, domain controllers, and financial systems. Lateral movement is what transforms a single compromised workstation into a network-wide ransomware event. VLANs, next-generation firewalls with internal traffic inspection, MFA on administrative access, and monitoring for unusual Remote Desktop Protocol (RDP) connections each reduce lateral movement opportunities significantly.
11. Collection (TA0009)
Adversaries gather financial records, customer information, intellectual property, or credentials for exfiltration or double-extortion ransomware—where attackers threaten to publish stolen data unless paid. Data Loss Prevention (DLP) tools, file access auditing on sensitive directories, and encryption of sensitive data at rest are the primary controls. Strict least-privilege access policies also limit how much data an attacker can collect from a single compromised account.
12. Command and Control (TA0011)
Attackers establish communication channels with compromised systems to send commands and receive stolen data—often using encrypted channels or legitimate web services to blend with normal traffic. C2 traffic is typically the longest-running phase of an attack. DNS filtering blocks known malicious domains and is one of the highest-ROI controls for SMBs, typically costing $3–5 per user per month while eliminating a large percentage of malware communications before they establish persistence.
13. Exfiltration (TA0010)
Adversaries steal data through cloud storage, email, or direct network transfer. Data exfiltration creates regulatory violations under IRS Publication 4557, HIPAA, and state breach notification laws. Monitoring outbound data transfers for volume anomalies, restricting cloud storage to approved platforms, and egress filtering rules all reduce exfiltration risk. Encrypting sensitive data at rest renders stolen data unusable even when exfiltration succeeds.
14. Impact (TA0040)
Attackers manipulate, interrupt, or destroy your systems and data—most commonly through ransomware encryption (T1486) or data destruction (T1485). Impact is the final attack stage, and the most visible. Immutable, offline backup systems are the most important defense here: T1490 (Inhibit System Recovery) specifically targets backup systems to prevent victims from recovering without paying. Testing disaster recovery procedures quarterly and maintaining ransomware-specific incident response playbooks determine how quickly your business can resume operations after an attack.
2026 Tax Season Security Warning
IRS threat intelligence confirms tax professionals face elevated targeting during January–April 2026. Attackers specifically use T1566.002 (Spearphishing Link) and T1078 (Valid Accounts) during filing season, impersonating the IRS and tax software vendors. Verify your email security, MFA enrollment, and EDR are fully operational before filing season opens. Review the most common cyberattacks targeting tax firms to understand current threat patterns.
Mapping Your Current Security Controls to MITRE ATT&CK
Before implementing new defenses, a gap analysis identifies which ATT&CK techniques you can already detect or prevent and where vulnerabilities exist. Most small businesses discover the largest gaps in Credential Access, Lateral Movement, and Exfiltration tactics—the three areas where traditional antivirus provides the least coverage.
The process starts by inventorying every security control you currently have: antivirus software, firewalls, email filtering, backup systems, MFA implementations, patch management procedures, and employee security training. For each control, identify which ATT&CK techniques it addresses. Email filtering with anti-phishing capabilities mitigates T1566 (Phishing); EDR detects T1059.001 (PowerShell), T1003 (Credential Dumping), and T1055 (Process Injection). Then compare what you cover against the techniques most commonly used against businesses in your industry.
The MITRE ATT&CK Navigator provides a free, browser-based tool for visualizing your defensive coverage across the entire framework—export the gap analysis results to share with security vendors or managed service providers when evaluating solutions. For tax and accounting firms, prioritize T1566 (Phishing), T1078 (Valid Accounts), T1486 (Data Encrypted for Impact), and T1490 (Inhibit System Recovery). Healthcare organizations should emphasize T1133 (External Remote Services) and T1005 (Data from Local System) given HIPAA's focus on electronic protected health information (ePHI) access controls.
Pair your gap analysis with a social engineering assessment to validate whether your controls hold up against real attack simulations, not just theoretical coverage maps.
90-Day MITRE ATT&CK Implementation Roadmap
Days 1–14: Assess and Map
Create a free account at attack.mitre.org, open the ATT&CK Navigator, and inventory all current security tools. Map each tool to the ATT&CK techniques it detects or prevents, then document coverage gaps for your top 20 priority techniques.
Days 15–30: Secure Initial Access
Deploy MFA on all cloud services and remote access systems to mitigate T1078 and T1133. Implement email security with anti-phishing capabilities to address T1566. These two controls address the most common attack entry points for SMBs.
Days 31–60: Deploy Endpoint and Backup Controls
Install EDR or next-generation antivirus with behavioral detection across all endpoints—this single control covers 50+ ATT&CK techniques. Establish immutable backup systems with offline copies to protect against T1490 and T1486.
Days 61–75: Add Detection Depth
Implement DNS filtering to block C2 communications. Enable PowerShell Script Block Logging on Windows systems. Set up file access auditing on directories containing financial records, client data, or credentials.
Days 76–90: Formalize and Train
Create an incident response playbook organized by ATT&CK tactics. Conduct security awareness training covering T1566 phishing scenarios. Schedule monthly security reviews to track technique coverage improvements and identify newly disclosed techniques.
Budget-Friendly MITRE ATT&CK Implementation for Small Businesses
Effective ATT&CK-based defenses don't require enterprise budgets. The key is prioritizing controls that address the most common attack techniques in your industry while building detection and response capabilities incrementally.
Essential Tier: $200–500/Month (5–25 Employees)
This tier provides foundational coverage for approximately 40–50% of high-priority ATT&CK techniques. Email security with anti-phishing capabilities ($5–8/user/month) mitigates T1566 (Phishing) and T1598 (Phishing for Information). EDR ($6–12/endpoint/month) detects and blocks 50+ techniques including T1059.001 (PowerShell), T1003 (Credential Dumping), and T1486 (Ransomware). MFA ($3–6/user/month) prevents credential-based attacks including T1078 (Valid Accounts) and T1110 (Brute Force). Cloud backup with immutable storage ($50–100/month) protects against T1490 (Inhibit System Recovery) and T1485 (Data Destruction). Together, these controls address Initial Access, Execution, Credential Access, and Impact tactics with genuine detection capability.
Enhanced Tier: $500–1,200/Month (25–100 Employees)
Adding Managed Detection and Response (MDR) ($150–300/month) brings 24/7 monitoring, threat hunting, and professional incident investigation to your Essential Tier controls. DNS filtering ($3–5/user/month) blocks C2 communications (T1071), malware downloads (T1105), and drive-by compromises (T1189). Patch management automation ($100–200/month) eliminates exploitable vulnerabilities targeted by T1068 and T1190. Security awareness training ($3–5/user/year) measurably reduces phishing success rates. This tier increases total ATT&CK coverage to 65–75% of techniques, adding strong defenses for Defense Evasion, Command and Control, and Discovery tactics.
Advanced Tier: $1,200–2,500/Month (100+ Employees or High-Risk Industries)
Extended Detection and Response (XDR) ($400–800/month) unifies threat detection across endpoints, network, cloud, and email into a single correlated view—eliminating the blind spots attackers exploit when moving between environments. Privileged Access Management (PAM) ($200–400/month) prevents lateral movement and credential theft by enforcing just-in-time access. Network segmentation with internal firewall rules ($300–600/month) contains breaches and limits lateral movement scope. Periodic vulnerability scanning and penetration testing ($200–400/month) validates that controls are working as expected. This tier achieves 85–95% coverage of ATT&CK techniques, with advanced capabilities specifically for Lateral Movement, Collection, and Exfiltration detection—the tactics most relevant to double-extortion ransomware and regulatory data breach liability.
Real-World ATT&CK Implementation: Tax Firm Case Study
A 12-person tax preparation firm implemented ATT&CK-based defenses after reviewing IRS Publication 4557 cybersecurity requirements. Their starting security posture consisted only of traditional antivirus and a basic firewall—covering fewer than 25% of relevant ATT&CK techniques, with no visibility into credential access, lateral movement, or exfiltration activity.
They deployed Essential Tier controls at $385/month: EDR, email security with anti-phishing, MFA on all cloud services, and immutable cloud backup. Implementation took eight weeks during off-season with minimal disruption to operations.
Six months later, the firm received sophisticated spearphishing emails (T1566.002 — Spearphishing Link) impersonating the IRS during filing season. The emails contained malicious links leading to credential harvesting pages. The email security platform immediately quarantined most messages. Three employees clicked links in emails that bypassed the filter, but MFA blocked the attackers from accessing accounts even with valid stolen passwords. What would have been a catastrophic ransomware event and client data breach—with potential FTC Safeguards Rule violations and estimated losses exceeding $780,000—was stopped at the Credential Access tactic.
The $385/month investment increased their ATT&CK technique coverage from 25% to 68%, with particularly strong defenses against Initial Access (T1566), Credential Access (T1078, T1110), and Impact (T1486, T1490) tactics. Their updated WISP now references specific ATT&CK technique IDs for each control, satisfying IRS risk assessment documentation requirements.
MITRE ATT&CK Quick-Start Checklist
- Create a free account at attack.mitre.org and review the Enterprise Matrix
- Open ATT&CK Navigator to visualize the framework and plan coverage
- Inventory all current security tools: antivirus, firewall, email security, backup, MFA
- Map existing tools to the ATT&CK techniques they detect or prevent
- Identify your top 20 high-priority techniques based on industry threat reports
- Document coverage gaps where no detection or prevention exists for priority techniques
- Deploy MFA on all cloud services and remote access (mitigates T1078, T1133)
- Implement email security with anti-phishing capabilities (mitigates T1566)
- Deploy EDR with behavioral detection across all endpoints (covers 50+ techniques)
- Establish immutable backup with offline copies (protects against T1490, T1486)
- Create an incident response playbook organized by ATT&CK tactics
- Schedule monthly security reviews to track technique coverage improvements
Free MITRE ATT&CK Tools and Resources
MITRE and the security community provide extensive free resources to help small businesses implement ATT&CK-based defenses without needing a dedicated security team.
Official MITRE Resources
The ATT&CK website provides the complete technique catalog with detailed descriptions, detection methods, and mitigation strategies for every entry. ATT&CK Navigator is a browser-based tool for visualizing technique coverage, building heatmaps, and documenting gap analyses—exportable for sharing with vendors or auditors. ATT&CK Workbench is a desktop application for customizing the framework to your specific environment, useful for organizations that want to track local threat intelligence alongside the public knowledge base. The Cyber Analytics Repository (CAR) provides detection analytics mapped to ATT&CK techniques in pseudocode, helping security engineers implement specific detections in SIEM platforms.
Community and Open-Source Tools
Atomic Red Team provides a collection of simple automated tests for validating detection coverage, with test cases for 350+ techniques that security teams can safely execute to verify that EDR and SIEM detections actually fire. Caldera is an adversary emulation platform for running complete attack scenarios—useful for purple team exercises and testing incident response procedures before a real incident. Sigma Rules offers a generic signature format for SIEM systems, with 2,000+ detection rules mapped to ATT&CK techniques available as open source. VECTR is a purple team management platform for tracking red team exercises, blue team detections, and coverage improvements over time.
Vendor ATT&CK Integration
When evaluating security vendors, ask specifically about their ATT&CK coverage map. Request documentation showing which techniques their solution detects, prevents, or mitigates. Modern EDR platforms—including CrowdStrike, SentinelOne, and Microsoft Defender for Endpoint—tag alerts with ATT&CK technique IDs natively. SIEM systems like Splunk, Microsoft Sentinel, and Elastic Security include ATT&CK-mapped detection rules and dashboards. Leading MDR providers organize detection analytics and incident reports using ATT&CK taxonomy. This ATT&CK-based evaluation approach enables objective comparison of security tools based on actual defensive coverage rather than marketing claims.
Integrating MITRE ATT&CK with Other Security Frameworks
MITRE ATT&CK complements—rather than replaces—other security frameworks. The two most relevant integrations for small businesses are NIST CSF and compliance-specific frameworks like IRS Publication 4557 and HIPAA.
NIST Cybersecurity Framework + MITRE ATT&CK
The NIST Cybersecurity Framework (CSF) 2.0 provides high-level functions—Govern, Identify, Protect, Detect, Respond, Recover—while ATT&CK offers tactical implementation details for each. In the Identify function, use ATT&CK to pinpoint which techniques threaten your specific assets and business processes. In the Protect function, implement mitigations documented on ATT&CK technique pages. In the Detect function, build detection analytics using ATT&CK technique IDs as anchors. This mapping satisfies NIST SP 800-171 requirements for organizations handling Controlled Unclassified Information (CUI) and provides documented evidence of systematic risk management.
Compliance Frameworks + MITRE ATT&CK
For tax professionals, ATT&CK provides the technical backbone for IRS Publication 4557's risk assessment requirement—each technique ID corresponds to a documented threat that your controls must address. Healthcare organizations can map HIPAA Security Rule §164.312 technical safeguard requirements to specific ATT&CK techniques, demonstrating that administrative, physical, and technical controls address known attack vectors. PCI DSS 4.0 Requirement 6.3 specifically calls for protection against known vulnerabilities, which ATT&CK technique coverage directly supports. For businesses pursuing HIPAA compliance or handling payment card data, ATT&CK-based gap analysis transforms abstract compliance requirements into specific, measurable security controls.
The practical result: businesses that document their security controls using ATT&CK technique IDs have a ready-made response to auditor questions about risk assessment methodology, threat modeling, and control effectiveness. This documentation also strengthens cyber insurance applications and incident response retainer negotiations by demonstrating a structured, intelligence-driven security program.
Need Help Mapping Your ATT&CK Coverage?
Our security team helps small businesses run ATT&CK gap analyses, identify their highest-risk technique exposures, and build a prioritized remediation roadmap—without enterprise-level budgets.
ATT&CK for Specific Industries: Tax, Healthcare, and Professional Services
While the Enterprise Matrix applies across industries, threat actors prioritize techniques differently based on their targets. Understanding which technique clusters are most active in your sector allows you to focus your first 90 days on the highest-probability threats rather than spreading defenses evenly across 273+ techniques.
Tax and Accounting Firms
Tax professionals are high-value targets because they hold Social Security numbers, employer identification numbers, financial account data, and direct access to IRS systems. The dominant attack patterns are: T1566 (Phishing) impersonating the IRS or tax software vendors; T1078 (Valid Accounts) using credentials stolen from prior breaches; and T1486 (Data Encrypted for Impact) via ransomware timed to filing deadlines. Security awareness training specific to tax-season social engineering, email security, and immutable backups are the three controls that address over 70% of successful attacks against accounting firms. A compliant WISP template that references ATT&CK technique IDs satisfies IRS Publication 4557 risk assessment documentation requirements.
Healthcare and Dental Practices
Healthcare organizations face regulatory obligations under HIPAA Security Rule §164.312 alongside persistent targeting by ransomware groups that exploit T1133 (External Remote Services)—specifically RDP and VPN vulnerabilities on internet-facing systems. T1005 (Data from Local System) and T1114 (Email Collection) are used to stage ePHI exfiltration before ransomware deployment, enabling double-extortion. Healthcare entities should prioritize patching internet-facing systems, deploying EDR on all clinical workstations, and implementing network segmentation that isolates clinical systems from administrative networks. Review our guide to healthcare data breach prevention for sector-specific implementation guidance.
Professional Services and Financial Firms
Law firms, financial advisors, and consultancies face elevated risk from T1589 (Gather Victim Identity Information) and T1566.002 (Spearphishing Link) because adversaries target client relationship data and financial transaction records. Business Email Compromise (BEC), mapped to T1534 (Internal Spearphishing) and T1566 (Phishing), is the leading cause of financial loss for professional services firms. Multi-factor authentication on email platforms and financial systems is the single most effective control for this threat profile, preventing credential theft from translating into fraudulent wire transfers or data theft even when phishing emails succeed.
What This Means for Your Business
You don't need to defend against all 273+ ATT&CK techniques simultaneously. Identify the 20–30 techniques most commonly used against your industry, map your current controls against them, and fill the gaps systematically. A focused, intelligence-driven approach with a $385/month Essential Tier stack delivers more real-world protection than an unfocused $2,000/month spend on overlapping tools.
Get Your Free MITRE ATT&CK Coverage Assessment
Our security experts will analyze your current defenses against the ATT&CK techniques most commonly used against your industry and deliver a prioritized remediation roadmap.
Frequently Asked Questions
MITRE ATT&CK is a free, publicly maintained catalog of the specific techniques attackers use to compromise computer systems. Think of it as a documented playbook of real attacker behavior—organized by attack phase—that security teams use to build targeted defenses. Each technique has a unique ID (like T1566 for phishing), a description, detection guidance, and recommended mitigations. It was created by MITRE Corporation and is updated regularly based on real-world incident data.
Yes. The MITRE ATT&CK framework is free and publicly accessible at attack.mitre.org. MITRE also provides free companion tools including ATT&CK Navigator (for visualizing coverage), ATT&CK Workbench (for customization), and the Cyber Analytics Repository (CAR) with detection analytics. The framework is licensed under a Creative Commons Attribution 4.0 license.
As of version 18 (2025), the Enterprise Matrix covers 14 tactics and 273+ techniques, many of which have sub-techniques that document more specific variations. The Mobile Matrix adds 100+ mobile-specific techniques, and the ICS Matrix covers operational technology environments with 11 tactics. MITRE updates the framework regularly as new attack techniques are observed in the wild.
Tactics represent the adversary's high-level objective at each phase of an attack—for example, Initial Access (gaining a foothold) or Exfiltration (stealing data). Techniques are the specific methods used to achieve those objectives—for example, T1566 (Phishing) is one technique under the Initial Access tactic. Sub-techniques provide even more granular specificity: T1566.001 (Spearphishing Attachment) and T1566.002 (Spearphishing Link) are sub-techniques of T1566.
Start with three steps: (1) Open the ATT&CK Navigator and review the 14 tactics. (2) Inventory your current security tools and map them to techniques. (3) Identify your top 10–20 uncovered techniques based on your industry's threat profile. From there, focus your first investment on MFA, email security with anti-phishing, and EDR—these three controls address the majority of successful small business attacks. If you lack internal expertise, a Managed Detection and Response (MDR) provider can map your coverage and manage your defenses using ATT&CK taxonomy.
The IRS does not specifically mandate ATT&CK, but IRS Publication 4557 requires tax preparers to conduct a risk assessment and document security controls in a Written Information Security Plan (WISP). Using ATT&CK technique IDs in your WISP risk assessment satisfies this requirement while providing a structured, defensible methodology. Learn more about WISP requirements for tax preparers and access a free WISP template.
Most modern enterprise security tools now tag detections with ATT&CK technique IDs. EDR platforms including CrowdStrike Falcon, SentinelOne, and Microsoft Defender for Endpoint automatically map alerts to ATT&CK. SIEM platforms including Splunk, Microsoft Sentinel, and Elastic Security include ATT&CK dashboards and detection libraries. Threat intelligence platforms like Recorded Future and Anomali tag indicators with ATT&CK techniques. When evaluating tools, ask vendors to provide their ATT&CK coverage documentation and compare it against your gap analysis.
NIST CSF 2.0 provides high-level governance functions (Govern, Identify, Protect, Detect, Respond, Recover) while ATT&CK provides the tactical implementation details within each function. They are complementary: use NIST CSF to structure your overall program and ATT&CK to define exactly what threats you're protecting against and how. Organizations subject to NIST SP 800-171—including federal contractors and businesses handling Controlled Unclassified Information—can use ATT&CK technique coverage as evidence of meeting specific control requirements.
MITRE releases major updates to ATT&CK twice per year, incorporating new techniques observed in recent incidents, refining existing technique descriptions, and adding sub-techniques as attacker methods evolve. Version 18 was released in 2025. Organizations using ATT&CK for gap analysis should review the release notes with each update to identify newly documented techniques that may not be covered by existing controls.
ATT&CK Navigator is a free, browser-based tool that displays the full ATT&CK matrix and allows you to annotate it with colors, scores, and comments to visualize your defensive coverage. To use it: visit mitre-attack.github.io/attack-navigator, select the Enterprise layer, and color-code techniques based on whether you can detect them (green), prevent them (blue), or have no coverage (red). Export the result as a JSON layer file to share with vendors, auditors, or an MDR provider. Many security vendors also publish pre-built Navigator layers showing the coverage their products provide.
Schedule
Want personalized advice?
Our cybersecurity experts can help you implement these best practices. Free consultation.



