logo

TOP ATT&CK TECHNIQUES

Project Summary

Published : May 10, 2022

Top ATT&CK Techniques provides defenders with a systematic approach to prioritizing ATT&CK techniques. Our open methodology considers technique prevalence, common attack choke points, and actionability to enable defenders to focus on the ATT&CK techniques that are most relevant to their organization.

The Top ATT&CK Techniques Calculator makes building customized top technique lists easy. Users can create a top 10 technique list tailored to their organization.

The Top Ransomware Technique List provides a starting point for defending against ransomware attacks and demonstrates how the Top ATT&CK Techniques methodology can be tailored to different use cases.

Problem

Defending against all ATT&CK techniques is simply not practical, and without guidance, determining which techniques to focus on is overwhelming.

SOLUTION

Publish a methodology and tools to help defenders systematically prioritize ATT&CK techniques.

IMPACT

Defenders focus on the adversary behaviors that are most relevant to their organization and have the greatest effect on their security posture.

funding Research Participants

Non-Profit Research Participants

Leadership Spotlight: 
Collaborative Leadership Driving Innovation

Hear directly from research participants about this project and why it matters. Learn how these leaders are changing the game on the adversary.

Adoption Spotlights: Center R&D in Action

Adoption Spotlights showcase the Center’s R&D in action to help the community adopt threat-informed defense. Learn how these organizations are leveraging Center R&D to change the game on the adversary.

Share This Project

Stay Informed

Stay informed about new releases of R&D projects and other exciting updates from the Center for Threat-Informed Defense.