Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/center-for-threat-informed-defense/top-attack-techniques

Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques to focus on first.
https://github.com/center-for-threat-informed-defense/top-attack-techniques

ctid cyber-threat-intelligence cybersecurity mitre-attack

Last synced: about 1 month ago
JSON representation

Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques to focus on first.

Awesome Lists containing this project

README

        

# Top ATT&CK Techniques

Top ATT&CK Techniques provides defenders with a systematic approach to prioritizing
MITRE ATT&CK® techniques. Our methodology considers technique prevalence, common
attack choke points, and actionability to enable defenders to focus on the ATT&CK
techniques that are most relevant to their organization.

**Table of Contents:**
- [Getting Started](#getting-started)
- [Getting Involved](#getting-involved)
- [Questions and Feedback](#questions-and-feedback)
- [Notice](#notice)

## Getting Started

The website hosts all of the resources for this project. The website is linked below
along with some shortcuts to important pages on the website.

| Resource | Description |
| ------------------------------------------------------------------------------------ | -------------------------------------------------------------------------- |
| [Web Site](https://top-attack-techniques.mitre-engenuity.org/) | The website hosts the calculator, methodology, and ransomware top 10 list. |
| [Ransomware Top 10](https://top-attack-techniques.mitre-engenuity.org/#top-10-lists) | A curated top 10 list created by our expert ATT&CK analysts. |
| [Calculator](https://top-attack-techniques.mitre-engenuity.org/#calculator) | An interactive calculator for producing your own, customized top 10 lists. |
| [Methodology](https://top-attack-techniques.mitre-engenuity.org/#methodology) | An overview of the algorithms and analysis that power the calculator. |

## Getting Involved

There are several ways that you can get involved with this project and help
advance threat-informed defense:

- **Review the Ransomware Top 10 list.**
If ransomware is a threat that your organization is tracking and working to mitigate, consult our Ransomware Top 10 list align your effort with our analytical process.
- **Make your own top 10 list.** Use the calculator to create your own customized top 10
list of ATT&CK techniques.
- **Spread the word.** If you find Top ATT&CK Techniques valuable, share your experience
with your industry peers.

## Questions and Feedback

Please submit [issues on
GitHub](https://github.com/center-for-threat-informed-defense/top-attack-techniques/issues)
for any technical questions or requests. You may also contact
[[email protected]](mailto:[email protected]?subject=Question%20about%20top-attack-techniques)
directly for more general inquiries about the Center for Threat-Informed Defense.

We welcome your contributions to help advance Top ATT&CK Tehcniques in the form
of [pull
requests](https://github.com/center-for-threat-informed-defense/top-attack-techniques/pulls).
Please review the [contributor
notice](https://github.com/center-for-threat-informed-defense/top-attack-techniques/blob/main/CONTRIBUTING.md)
before making a pull request.

## Notice

© 2022, 2024 MITRE Engenuity. Approved for public release. Document number(s) CT0047.

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this
file except in compliance with the License. You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software distributed under
the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
KIND, either express or implied. See the License for the specific language governing
permissions and limitations under the License.

This project makes use of ATT&CK®: [ATT&CK Terms of
Use](https://attack.mitre.org/resources/terms-of-use/)