Statements (34)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:cybersecurity_framework
|
| gptkbp:covers |
ICS-specific adversary behaviors
|
| gptkbp:developedBy |
gptkb:MITRE_Corporation
|
| gptkbp:documentedIn |
MITRE ATT&CK for ICS documentation
|
| gptkbp:firstReleased |
2020
|
| gptkbp:focusesOn |
industrial control systems
|
| gptkbp:includes |
tactics
procedures techniques |
| gptkbp:license |
Creative Commons Attribution 4.0 International Public License
|
| gptkbp:matrixRepresentation |
ICS ATT&CK Matrix
|
| gptkbp:provides |
knowledge base of adversary tactics and techniques
|
| gptkbp:relatedTo |
gptkb:MITRE_ATT&CK
critical infrastructure protection industrial cybersecurity cyber threat intelligence |
| gptkbp:supports |
incident response
adversary emulation security assessments detection development mapping of threats to ICS environments |
| gptkbp:targetAudience |
security professionals
threat analysts defenders ICS asset owners |
| gptkbp:updated |
periodically
|
| gptkbp:usedFor |
security operations
cyber threat intelligence threat modeling defensive gap assessment |
| gptkbp:website |
https://attack.mitre.org/matrices/ics/
|
| gptkbp:bfsParent |
gptkb:Enterprise_ATT&CK
|
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
ATT&CK for ICS
|