Skip to main content

MITRE ATT&CK Integration

Map security findings to adversary techniques for threat-informed defense.

Overview

MITRE ATT&CK is a knowledge base of adversary tactics and techniques based on real-world observations. Infracast automatically maps your security findings to ATT&CK techniques, helping you understand which adversary behaviors your environment is exposed to.

How It Works

  1. Infracast discovers your infrastructure and identifies security findings
  2. Findings are mapped to ATT&CK techniques based on the vulnerability or misconfiguration type
  3. You see which techniques adversaries could use against your environment
  4. Prioritize remediation based on technique coverage and threat intelligence

Viewing ATT&CK Coverage

  1. Go to Security → MITRE ATT&CK
  2. View the ATT&CK matrix with technique coverage
  3. Click any technique to see related findings

Understanding the View

Technique Colors:

  • 🔴 Red — Your environment has findings mapped to this technique
  • Gray — No current exposure to this technique

Coverage Percentage: Shows what percentage of ATT&CK techniques you have findings for (lower is better).

Kill Chain Visualization

See how findings map across the attack lifecycle:

PhaseDescription
ReconnaissanceInformation gathering about your organization
Initial AccessEntry points into your environment
ExecutionRunning malicious code
PersistenceMaintaining access
Privilege EscalationGaining higher permissions
Defense EvasionAvoiding detection
Credential AccessStealing credentials
DiscoveryLearning about your environment
Lateral MovementMoving through your network
CollectionGathering target data
ExfiltrationStealing data
ImpactDisrupting operations

Common Technique Mappings

Initial Access (TA0001)

Finding TypeTechnique
Public-facing service vulnerabilityT1190: Exploit Public-Facing Application
Exposed SSH/RDPT1133: External Remote Services
Phishing risk (MFA gaps)T1566: Phishing

Privilege Escalation (TA0004)

Finding TypeTechnique
IAM overprivilegeT1078: Valid Accounts
Role assumption gapsT1098: Account Manipulation
Sudo misconfigurationsT1548: Abuse Elevation Control

Defense Evasion (TA0005)

Finding TypeTechnique
Logging disabledT1562.008: Disable Cloud Logs
Security tool gapsT1562: Impair Defenses
Unencrypted storageT1027: Obfuscated Files (data at rest)

Exfiltration (TA0010)

Finding TypeTechnique
Public S3 bucketsT1537: Transfer to Cloud Account
Unrestricted egressT1041: Exfiltration Over C2 Channel
No DLP controlsT1048: Exfiltration Over Alternative Protocol

Threat Actor Correlation

Infracast correlates your technique exposure with known threat actors:

  1. View which threat groups use techniques you're exposed to
  2. Prioritize based on threat relevance to your industry
  3. Focus on techniques used by actors targeting your sector

Using ATT&CK for Prioritization

Risk-Based Approach

Prioritize findings that map to:

  1. Initial Access techniques — prevent entry
  2. Privilege Escalation — limit blast radius
  3. Exfiltration — protect critical data

Threat-Informed Approach

  1. Identify threat actors relevant to your industry
  2. See which of their techniques you're exposed to
  3. Prioritize closing those specific gaps

Reports

Generate ATT&CK-aligned reports:

  • Executive Summary — High-level technique coverage
  • Technical Assessment — Detailed technique-to-finding mapping
  • Threat Actor Brief — Relevant adversary exposure

Best Practices

  1. Focus on High-Impact Techniques — Not all techniques are equal; prioritize initial access and privilege escalation
  2. Track Coverage Over Time — Monitor your technique exposure trending down
  3. Align with Threat Intel — Focus on techniques used by actors targeting your industry
  4. Integrate with Detection — Use technique mapping to improve detection rules