Cybersecurity Reference > Glossary
What is the Mitre ATT&CK Framework?
Developed and maintained by MITRE Corporation, a nonprofit that runs federally funded research centers, ATT&CK stands for Adversarial Tactics, Techniques, and Common Knowledge. It organizes attacker behavior into a structured matrix that maps out the full lifecycle of an intrusion—from initial reconnaissance through data exfiltration or impact. The framework distinguishes between tactics (the adversary's goals at each stage) and techniques (the specific methods used to achieve those goals), with sub-techniques providing even finer detail.
ATT&CK covers multiple technology domains: Enterprise environments (Windows, Linux, macOS, cloud platforms), Mobile devices, and Industrial Control Systems. Each technique entry includes descriptions of how it works, examples of threat groups that use it, detection strategies, and potential mitigations.
Security teams use ATT&CK as a common language for threat intelligence, a blueprint for red team exercises, a foundation for building detection rules, and a framework for assessing defensive coverage. Because it's grounded in documented adversary behavior rather than theoretical attack models, ATT&CK helps bridge the gap between abstract security concepts and the practical realities of defense.
Origin
As the framework gained traction in the security community, MITRE expanded it to cover additional platforms—cloud infrastructure, Linux, macOS, mobile devices, and industrial control systems. The community itself began contributing observations, suggesting refinements, and building tools around the framework.
By 2018, ATT&CK had become something of an industry standard, referenced in threat reports, vendor product documentation, and security operations playbooks. MITRE continues to update the framework quarterly, adding new techniques as attackers develop them and refining existing entries based on community feedback and ongoing research.
Why It Matters
It's become the de facto standard for threat intelligence reporting, with most major security vendors and intelligence providers mapping their findings to ATT&CK techniques. This common language makes it possible to compare threat reports, assess defensive coverage, and prioritize security investments based on which techniques are most commonly used by relevant threat actors.
Security teams use the framework to identify gaps in their detection and response capabilities, structure red team exercises around realistic adversary behaviors, and measure how well their security controls would perform against specific threat groups. The framework also helps bridge communication gaps between technical teams and management by providing a clear, structured way to discuss threats and defensive posture. As attacks grow more sophisticated and span hybrid cloud environments, having a comprehensive map of adversary techniques becomes increasingly valuable for staying ahead of threats.
The Plurilock Advantage
We map findings to specific ATT&CK techniques, giving you clear visibility into which adversary behaviors your current defenses can detect and which slip through unnoticed. This approach helps prioritize remediation based on real-world attack patterns rather than theoretical risks.
Learn more about our adversary simulation and readiness services.
.
Need Help Implementing MITRE ATT&CK Framework?
Plurilock's cybersecurity experts can help you deploy and optimize MITRE ATT&CK for enhanced threat detection.
Get Framework Implementation Support → Learn more →




