ATT&CK (MITRE ATT&CK)
A globally-accessible knowledge base of adversary tactics and techniques based on real-world observations, used for threat modeling and detection engineering.
MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a curated knowledge base and model for cyber adversary behavior, reflecting the various phases of an adversary's attack lifecycle and the platforms they are known to target. ATT&CK is used as a foundation for the development of specific threat models and methodologies in the private sector, government, and the cybersecurity product and service community. Security teams use ATT&CK to assess gaps in their defenses, prioritize detections, and align SOC operations to real-world attack patterns. CyberUp24 leverages MITRE ATT&CK across its SOC Optimization and Consulting engagements.
Related terms
SOAR (Security Orchestration, Automation and Response)
Technology that automates security workflows, orchestrates tools, and accelerates incident response — transforming manual SOC tasks into intelligent, repeatable processes.
Read full description
S
s
SIEM (Security Information and Event Management)
A platform that aggregates and analyzes security data from across an organization's environment to detect threats and generate alerts in real time.
Read full description
S
s
Vulnerability Scanning
Automated identification and analysis of security weaknesses in systems, networks, and applications to prioritize remediation efforts.
Read full description
V
v
Zero Trust
A security model based on the principle of never trust always verify — requiring continuous authentication and authorization for every user device and connection regardless of location.
Read full description
Z
z
Threat Hunting
A proactive security practice where analysts actively search for hidden threats and adversaries within an organization's environment before alerts are triggered.
Read full description
T
t
SOAR (Security Orchestration Automation and Response)
Technology that automates security workflows, orchestrates tools, and accelerates incident response — transforming manual SOC tasks into intelligent, repeatable processes.
Read full description
S
s
