Flattened MITRE ATT&CK Matrix

1 minute read

Inspired by MITRE

This version contains all matrix categories mapped to techniques with examples of application by software or threat actor groups. It also includes visibility sources required to detect the attack, permissions required for the attack to be successful, whether or not network access is required, which defense is bypassed and a vignette on each example.

I find it useful to filter on visibility sources to help determine your organization’s strengths and weaknesses in continuous monitoring.

Non-embedded version available



Hope you found this useful and if you have any questions or suggestions, please post them in the comments section below.