MITRE ATT&CK
mapping for pentests, red teams, and detection coverage
Tag every penetration testing and red team finding with the MITRE ATT&CK tactics and techniques the attacker would use. Track coverage across the kill chain, plan adversary emulation engagements, and produce reports defenders can act on.
No credit card required. Free plan available forever.
MITRE ATT&CK: a shared vocabulary for offensive and defensive work
MITRE ATT&CK is a globally accessible knowledge base of adversary tactics and techniques, drawn from observed real-world incidents and maintained by MITRE. It is organised as a matrix where columns represent tactics (the adversary's objective at a step) and cells represent the techniques and sub-techniques used to achieve them. ATT&CK has become the de facto common language for penetration testers, red teams, threat intelligence analysts, detection engineers, and CISOs talking to each other about how attacks actually unfold.
The framework is structured but not prescriptive. It does not tell you what to test or how to defend; it gives every party a shared identifier for what just happened, or for what the attacker is expected to do next. That is precisely what makes it useful in reporting. A finding tagged T1190 Exploit Public-Facing Application means the same thing to the pentester who logged it, the SOC analyst building a detection, the CISO sizing risk, and the auditor checking that an annual test was actually threat-informed.
The three matrices and when each one applies
ATT&CK is split into three top-level matrices, each curated against a different environment. Picking the right matrix at engagement scoping time saves a lot of awkward re-tagging at report time, because techniques in one matrix do not always have direct equivalents in another.
Enterprise
Covers Windows, macOS, Linux, network devices, and the major cloud platforms (AWS, Azure, GCP, Office 365, SaaS, IaaS). This is the matrix most penetration tests, internal red team operations, and Active Directory engagements map against. The Enterprise matrix subsumes the older PRE matrix, so reconnaissance and resource development tactics live here too.
Mobile
Covers iOS and Android. Used by mobile application pentests, MDM bypass research, and mobile-focused adversary emulation. Mobile-specific techniques like Adversary-in-the-Middle on mobile networks, abuse of accessibility services, and SMS-based credential phishing all live in this matrix.
ICS
Covers industrial control systems including engineering workstations, historians, PLCs, and safety instrumented systems. Used by OT and ICS pentest engagements, with techniques like Modify Program (T0889), Block Reporting Message (T0804), and Loss of Safety (T0880) that have no equivalent in the Enterprise matrix.
Tactic, technique, sub-technique, procedure: knowing where to tag
ATT&CK is layered. Confusing the layers is the most common reason a technique-tagged report fails to land with defenders. Use the layers as written: tactics describe the objective, techniques and sub-techniques describe the method, and procedures describe the concrete behaviour observed during an engagement.
- Tactic: the adversary objective at a step (TA0001 Initial Access, TA0002 Execution, and so on through TA0040 Impact)
- Technique: how the adversary achieves the objective (T1190 Exploit Public-Facing Application sits under Initial Access)
- Sub-technique: a more specific variant of the parent technique (T1059.001 PowerShell sits under T1059 Command and Scripting Interpreter)
- Procedure: the concrete tooling, payload, or behaviour observed in a real engagement, captured against a technique or sub-technique
Tagging principles that survive contact with the engagement
Most ATT&CK programmes start strong and decay because tagging happens at report time rather than during testing. By then the operator memory is gone, the screenshots are unsorted, and the technique IDs end up approximate. Build the discipline into the workflow instead.
- Tag findings at the lowest level you have evidence for; if you proved PowerShell execution, log T1059.001, not just T1059
- A single finding can map to more than one technique; record every technique the same evidence supports rather than picking one
- Always capture the procedure (the exact command, payload, or tool) alongside the technique ID so the defender can build a detection
- Treat negative results as data: techniques attempted and blocked are valuable coverage signals for the report
- Use the latest ATT&CK version for the engagement and record which version was used; the matrix changes meaningfully between releases
- Distinguish discovered evidence (defender artefact) from successful execution (attacker outcome) so report readers can size detection gaps
Running an ATT&CK aligned penetration test, end to end
Penetration tests benefit from ATT&CK even when the engagement is a single web application or external scope. The tactics and techniques give the report a structure that connects technical findings to the way an attacker would actually chain them. The workflow below assumes the engagement is run as a structured project rather than a collection of ad-hoc artefacts.
Pick the matrix and starting tactics for the engagement
External pentests start at TA0043 Reconnaissance and TA0001 Initial Access; internal and assumed-breach engagements often start at TA0002 Execution or TA0007 Discovery. Cloud-only engagements use the Enterprise matrix Cloud platforms. ICS and Mobile engagements use their dedicated matrices. Document the chosen matrix and tactic scope in the engagement brief so coverage can be measured against it.
Plan techniques against the threat model
Map the agreed threat actor profile to the techniques most likely in scope. A commodity ransomware affiliate looks very different from an APT-style operator; planning by technique avoids the trap of running the same playbook for every engagement. Capture the planned techniques against the engagement record so the test plan and the eventual report share one identifier system.
Execute and tag findings as you go
Every finding gets a technique ID at creation, not at report time. Tag evidence with screenshots, command output, and timestamps. Where a finding chains across multiple tactics (for example a phishing email that yields valid credentials, used for remote services, used for credential dumping), record the chain explicitly so the report tells the kill chain as a story.
Build the heat map and the gap analysis
At report time, derive the technique heat map from the tagged findings rather than building it by hand. The defender wants two views: techniques exercised and successful, and techniques attempted and blocked. Both are coverage data. Tie each technique result back to the responsible detection (SIEM rule, EDR signature, network policy) so the next iteration of the SOC roadmap is grounded in evidence.
Close the loop with detection engineering
The strongest ATT&CK reports do not stop at the technique list; they hand each finding back with a detection recommendation. Pair every successful technique with the data sources required (process creation, command line, authentication logs, network flow) and link to the equivalent ATT&CK Data Source. That makes the report directly actionable for the defender team rather than another deliverable to file.
Red team, purple team, and adversary emulation
ATT&CK is closest to its original purpose during red team and adversary emulation work. The framework was first published as a way to describe post-compromise behaviour observed in real intrusions, so engagements that emulate a specific threat actor or that measure detection coverage benefit the most from technique-level tagging. The red team workflow in SecPortal is built around the same model: scope the matrix, plan techniques, capture evidence per technique, and report by tactic and technique rather than by raw finding count. For collaborative exercises where red and blue operators work the same record and outcome is measured per technique, the purple team operations workflow applies the same tagging model with detection outcome captured inline against each action.
- Adversary emulation engagements that follow a documented threat actor playbook (G-group profile in ATT&CK)
- Purple team operations where the goal is detection coverage measurement, not just compromise
- Detection engineering test cycles where each new analytic is validated by re-running the relevant techniques
- Tabletop exercises that walk a hypothetical incident through ATT&CK tactics step by step
- Continuous threat-led exercises that re-test high-risk techniques on a defined cadence
- Procurement and vendor scoping conversations where ATT&CK becomes the shared language between buyer and provider
From technique to detection: the data source pivot
Every ATT&CK technique entry lists the data sources required to detect it (for example Process Creation, Command Execution, Authentication Logs, Network Traffic Flow). That data source list is the bridge between an offensive finding and a defensive analytic. A technique-tagged finding without a data source recommendation is a half-built report; with it, the defender team has a direct path to the SIEM rule, EDR query, or NDR signature that would catch the next instance. Pair every technique-tagged finding with the corresponding detection data sources so the report ends with action, not observation.
Where ATT&CK meets compliance and assurance
ATT&CK is not itself a compliance framework, but it threads through several. Threat-led and threat-informed are increasingly used as criteria in regulator and assessor language, and ATT&CK is by far the most cited common vocabulary. Mapping technique evidence to existing controls turns a single piece of test work into multiple compliance artefacts.
- NIST SP 800-53 Rev. 5 RA-3 (Risk Assessment) and IR-4 (Incident Handling) explicitly reference threat-informed approaches; ATT&CK is the most widely used vocabulary
- NIST Cybersecurity Framework Detect (DE) and Respond (RS) functions benefit from ATT&CK technique mapping for measurable detection coverage
- PCI DSS 11.4 penetration testing requirements are met more credibly when findings are technique-tagged rather than CVE-only
- CREST and TIBER-EU threat-led penetration testing programmes mandate ATT&CK alignment in deliverables
- SOC 2 Trust Services Criteria CC7.x security operations controls are easier to evidence with technique-tagged historical findings
- ISO 27001 Annex A.5.7 threat intelligence and A.8.16 monitoring controls are strengthened by tying detection content to ATT&CK
Where SecPortal fits in an ATT&CK workflow
SecPortal is the operating layer for the engagement, not a replacement for the ATT&CK knowledge base or the detection engineering team. The platform holds the matrix scope, the techniques planned, the techniques exercised, the evidence per technique, and the report that ties them together. Coverage tracking, kill chain narrative, and detection recommendations live alongside the same findings management record that drives CVSS scoring and remediation. For multi-framework programmes, the same finding can carry an ATT&CK tag plus mappings to NIST 800-53, ISO 27001, or SOC 2 without re-keying anything.
- Findings management with a free-form taxonomy that supports MITRE ATT&CK technique IDs alongside CVSS 3.1 scoring, CWE, and OWASP categorisation
- 300+ finding templates so common techniques (Exploit Public-Facing Application, OS Credential Dumping, Valid Accounts, Phishing) reuse the same description, severity, and remediation guidance
- Engagement management that holds the matrix scope, planned techniques, and per-technique evidence in one record across pentest, red team, and adversary emulation work
- Attack surface management that surfaces external recon and infrastructure findings tied to the Reconnaissance and Resource Development tactics, ready to tag against TA0043 and TA0042
- AI report generation that turns technique-tagged findings into an executive narrative and a kill chain story without re-keying the matrix into Word
- Compliance tracking that lets the same finding satisfy ATT&CK technique evidence and a 800-53, ISO 27001, SOC 2, PCI DSS, or Cyber Essentials control mapping at the same time
ATT&CK rewards consistency over time more than any single engagement. Techniques tagged on this year's pentest become the baseline for next year's coverage measurement, and the trend across engagements is what tells a CISO whether detection is actually improving. Run the work as a managed penetration testing workflow with technique tagging in place from day one, and the second engagement is far cheaper to scope, plan, and report than the first.
Key control areas
SecPortal helps you track and manage compliance across these domains.
Reconnaissance and Resource Development
Map external scan output, exposed services, leaked credentials, and infrastructure findings to TA0043 and TA0042 techniques like Active Scanning (T1595), Gather Victim Identity Information (T1589), and Acquire Infrastructure (T1583).
Initial Access
Tag findings tied to TA0001 techniques such as Phishing (T1566), Exploit Public-Facing Application (T1190), External Remote Services (T1133), and Valid Accounts (T1078) so report readers see the entry path, not just the bug.
Execution and Persistence
Track TA0002 and TA0003 evidence including Command and Scripting Interpreter (T1059), Scheduled Task (T1053), Boot or Logon Autostart Execution (T1547), and Create Account (T1136) discovered during authenticated tests and red team operations.
Privilege Escalation and Defense Evasion
Map findings to TA0004 and TA0005 techniques such as Abuse Elevation Control Mechanism (T1548), Access Token Manipulation (T1134), Indicator Removal (T1070), and Impair Defenses (T1562) with reproduction steps tied to each technique ID.
Credential Access and Discovery
Document TA0006 and TA0007 results across OS Credential Dumping (T1003), Brute Force (T1110), Account Discovery (T1087), and Network Service Discovery (T1046), including evidence captured from authenticated workstation tests and Active Directory engagements.
Lateral Movement, Collection, Exfiltration, and Impact
Cover the rest of the matrix (TA0008 through TA0040) with techniques like Remote Services (T1021), Data from Local System (T1005), Exfiltration Over C2 Channel (T1041), and Data Encrypted for Impact (T1486), plus cloud-specific equivalents from the Enterprise Cloud matrix.
Run ATT&CK aligned engagements without spreadsheets
Tag findings by technique, track coverage across the kill chain, and export technique-mapped reports defenders can act on.
No credit card required. Free plan available forever.