logo
        • Who We Are
        • Learn more about MITRE Engenuity’s journey as a hub for transformative innovation.

        • How We Engage
        • We forge innovative partnerships to generate whole-of-nation solutions to complex technological problems.

        • Contact Us
        • Connect with a member of the MITRE Engenuity team and ensure your inquiry gets to the right people.

        • Cybersecurity
        • We are relentlessly advancing the art of threat-informed defense, anchored by a belief that we can improve our defenses with a systemic application of a deep understanding of adversary tradecraft and technology.

        • ATT&CK Evaluations
        • We offer objective analysis of cyber products and features – see our latest results.

        • Center for Threat-Informed Defense
        • Read more about the cutting-edge research and development being done with input from our participant organizations, featuring some of the top security operations centers.

        • Developing tomorrow's cyber workforce today.
        • News & Insights
        • We are leading the leading edge of innovation. Explore the latest news, insights, R&D, and special projects from our advanced tech experts and partners.

        • Subscribe to Our Newsletters
        • Our tech foundation is addressing the complex problems that face our nation today. Find out how you can join our efforts as we spur innovation for public good.

          Subscribe

INSIDER THREAT TTP KNOWLEDGE BASE

Project Summary

Published : Mar 6, 2024

The Insider Threat Tactics, Techniques, and Procedures (TTP) Knowledge Base advances our collective understanding of the technical mechanisms that insider threats use. With this knowledge, Insider Threat Programs and Security Operations Centers can detect, mitigate, and emulate insider actions on IT systems to stop insider threats. Utilizing the Knowledge Base, cyber defenders across organizations will identify insider threat activity on IT systems and limit the damage.

Problem

SOCs and insider threat analysts need to know which technical mechanisms are used by insiders, and what controls mitigate insider threats.

SOLUTION

Develop an open knowledge base of the tactics, techniques, and procedures used by insiders in IT environments.

IMPACT

Defenders detect, mitigate, and emulate insider actions on IT systems and stop them.

Become a Contributor

Contributors to the Insider Threat Knowledge Base are founders of the community’s first cross-sector, multi-organizational, community-sourced body of Insider Threat data inspired by MITRE ATT&CK®. With this knowledge base of insider threat tactics, techniques, and procedures (TTPs) as a foundation, defenders will detect, mitigate, and emulate insider actions on IT systems and stop them. 

funding Research Participants

Share This Project

Stay Informed

Stay informed about new releases of R&D projects and other exciting updates from the Center for Threat-Informed Defense.