Command Zero
← Back to the glossary
Glossary · MITRE ATT&CK

What is MITRE ATT&CK?

MITRE ATT&CK is a knowledge base of adversary tactics, techniques, and procedures (TTPs) maintained by the MITRE Corporation, the standard taxonomy security teams use to classify attack behavior and map detection coverage.

Updated 2026-05-19

What it means

ATT&CK organizes adversary behavior into tactics (the adversary's goals, initial access, persistence, exfiltration) and techniques (the specific methods used to achieve each goal). Each technique has a unique identifier (T1078 for "Valid Accounts", T1566 for "Phishing", etc.) and detailed documentation. SOCs map detection rules, threat hunts, and incident response playbooks to ATT&CK techniques to measure coverage and communicate about adversary behavior consistently.

Command Zero’s approach

How Command Zero handles MITRE ATT&CK.

Command Zero tags investigation questions and case findings to specific MITRE techniques. Analysts can investigate by technique ("what evidence do we have for T1078 lateral movement?") and case reports include the ATT&CK mapping. The Casebook organizes investigations by technique, making it easy to study how specific adversary behaviors have surfaced across the customer base. MITRE alignment is built into Command Zero's investigation and reporting model.

Related terms
← Back to the glossary
See MITRE ATT&CK in production

Book a Command Zero demo.

Live in under an hour. No migration. Zero training data required.

Book a Demo
No training data requiredSOC 2 CompliantDirect-to-data