Statements (39)
Predicate | Object |
---|---|
gptkbp:instanceOf |
cybersecurity framework
|
gptkbp:contains |
tactics
detection techniques mitigations sub-techniques |
gptkbp:developedBy |
gptkb:MITRE_Corporation
|
gptkbp:firstReleased |
2013
|
gptkbp:focusesOn |
cyber adversary behavior
|
https://www.w3.org/2000/01/rdf-schema#label |
ATT&CK framework
|
gptkbp:language |
English
|
gptkbp:license |
gptkb:Creative_Commons_Attribution_4.0_International
|
gptkbp:matrixRepresentation |
gptkb:Enterprise_ATT&CK
gptkb:ICS_ATT&CK gptkb:Mobile_ATT&CK |
gptkbp:openToPublic |
true
|
gptkbp:supports |
adversary emulation
gap analysis mapping of adversary behavior purple teaming threat modeling detection engineering security control evaluation |
gptkbp:updated |
regularly
|
gptkbp:usedBy |
gptkb:government
gptkb:government_agency security professionals incident responders penetration testers threat hunters SOC analysts |
gptkbp:usedFor |
security operations
red teaming threat intelligence defensive gap assessment |
gptkbp:website |
https://attack.mitre.org/
|
gptkbp:bfsParent |
gptkb:MITRE
gptkb:MITRE_Corporation |
gptkbp:bfsLayer |
6
|