{"id":46598,"date":"2022-05-11T16:00:00","date_gmt":"2022-05-11T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=113817"},"modified":"2022-05-11T16:00:00","modified_gmt":"2022-05-11T16:00:00","slug":"center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders\/","title":{"rendered":"Center for Threat-Informed Defense, Microsoft, and industry partners streamline MITRE ATT&amp;CK\u00ae matrix evaluation for defenders"},"content":{"rendered":"<p>The <a href=\"https:\/\/ctid.mitre-engenuity.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">MITRE Center for Threat-Informed Defense<\/a>, Microsoft, and other industry partners collaborated on a <a href=\"https:\/\/ctid.mitre-engenuity.org\/our-work\/top-attack-techniques\/\" target=\"_blank\" rel=\"noreferrer noopener\">project<\/a> that created a repeatable methodology for developing a top MITRE ATT&amp;CK\u00ae techniques list. The method aims to facilitate navigation of the <a href=\"https:\/\/attack.mitre.org\/?msclkid=54cd021dc4b511ec89b26e4b6f39ec2f\" target=\"_blank\" rel=\"noreferrer noopener\">ATT&amp;CK framework<\/a>, which could help new defenders focus on critical techniques relevant to their organization\u2019s environment, and aid experienced defenders in prioritizing ATT&amp;CK techniques according to their organization\u2019s needs.<\/p>\n<p>The ATT&amp;CK framework provides an extensive list of specific techniques that may be challenging to navigate in certain situations. This project aims to help defenders who use the framework focus on noteworthy techniques regardless of the attack scenario or environment. For example, using research on 22 ransomware attacks, the repeatable methodology led to the identification of the top 10 ransomware techniques list.<\/p>\n<p>The project also included the development of a <a href=\"https:\/\/top-attack-techniques.mitre-engenuity.org\/calculator\" target=\"_blank\" rel=\"noreferrer noopener\">customizable, web-based calculator<\/a> that seeks to prioritize techniques based on a defender\u2019s input, making the methodology even easier to apply to different environments and scenarios. As an example of the insights that can be gained from using this calculator, the project found that the following techniques are present in most attacks and environments:<\/p>\n<p>This methodology considers the continuing evolution of threats, so it supports the creation of criteria that are tailored to an organization\u2019s unique environment. This enables defenders to continuously identify threat trends and decide where to focus resources for detection coverage.<\/p>\n<h2>Establishing the top ATT&amp;CK techniques<\/h2>\n<p>The methodology for identifying the top ATT&amp;CK techniques factored in three attributes to determine the significance of a technique: prevalence, choke point, and actionability.<\/p>\n<p><strong>Prevalence<\/strong> is the frequency of specific ATT&amp;CK techniques used by attackers over time. A higher frequency of a technique indicates a higher likelihood of it being used in multiple attack scenarios. Therefore, there\u2019s a higher chance of encountering an attack with a high prevalence ranking. Prevalence was determined using <a href=\"https:\/\/ctid.mitre-engenuity.org\/our-work\/sightings\/\" target=\"_blank\" rel=\"noreferrer noopener\">the Center\u2019s Sightings Ecosystem<\/a> project from April 2019 to July 2021, which registered 1.1 million encounters of attacks across the 184 unique ATT&amp;CK techniques. Including prevalence as a criterion aims to cover more attacks with fewer techniques.<\/p>\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"720\" height=\"287\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/05\/Figure-1-Attacks-over-time-627ad76ff17a7.png\" alt=\"A histogram that presents the number of attacks observed from January 2019 to April 2021, to show prevalence. This chart is originally from the MITRE Sightings Ecosystem project.\" class=\"wp-image-113829\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/05\/Figure-1-Attacks-over-time-627ad76ff17a7.png 720w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/05\/Figure-1-Attacks-over-time-627ad76ff17a7-300x120.png 300w\" sizes=\"auto, (max-width: 720px) 100vw, 720px\"><figcaption>Figure 1. Attacks over time (MITRE Sightings Ecosystem Project)<\/figcaption><\/figure>\n<p><strong>Choke points<\/strong> are techniques that disrupt an attacker due to them being a point of convergence or divergence. In real-world incidents, choke points manifest as one-to-many or many-to-one behaviors or steps in the attack. The inclusion of this criterion aims to identify the critical techniques that can help link activity throughout attack chains.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"936\" height=\"530\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/05\/Figure-2-MITRE-ATTCK-Technique-Process-Injection-T1055.jpg\" alt=\"A diagram illustrating a possible choke point based on many-to-one and one-to-many behaviors in an attack. It illustrates several techniques under many-to-one behaviors that converges to one technique that is the possible choke point, which in turn diverges into one-to-many behaviors.\" class=\"wp-image-113832\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/05\/Figure-2-MITRE-ATTCK-Technique-Process-Injection-T1055.jpg 936w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/05\/Figure-2-MITRE-ATTCK-Technique-Process-Injection-T1055-300x170.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/05\/Figure-2-MITRE-ATTCK-Technique-Process-Injection-T1055-768x435.jpg 768w\" sizes=\"auto, (max-width: 936px) 100vw, 936px\"><figcaption>Figure 2. MITRE ATT&amp;CK Technique Process Injection (T1055) is an example of a possible choke point<\/figcaption><\/figure>\n<p><strong>Actionability<\/strong> is the opportunity for a defender to detect or mitigate a technique. This is based on publicly available security controls (such as <a href=\"https:\/\/learn.cisecurity.org\/cis-controls-download\" target=\"_blank\" rel=\"noreferrer noopener\">CIS Critical Security Controls<\/a> and <a href=\"https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-53b\/final\" target=\"_blank\" rel=\"noreferrer noopener\">NIST 800-53 Security Controls<\/a>) and analytics (Splunk detections, Elastic, and Sigma).<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"576\" height=\"358\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/05\/Figure-3-Detection-to-mitigation-mapping.png\" alt class=\"wp-image-113835\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/05\/Figure-3-Detection-to-mitigation-mapping.png 576w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/05\/Figure-3-Detection-to-mitigation-mapping-300x186.png 300w\" sizes=\"auto, (max-width: 576px) 100vw, 576px\"><figcaption>&nbsp;Figure 3. Detection to mitigation mapping (MITRE Top ATT&amp;CK Techniques Methodologies)<\/figcaption><\/figure>\n<h2>Top 10 techniques in ransomware attacks<\/h2>\n<p>Following the creation of the methodology, the top 10 ransomware techniques list was generated to test this new approach in practice. To create this list, Microsoft and the other partners involved in this collaborative effort analyzed prevalent ransomware attacks from the past three years. A total of 22 specific ransomware attacks were studied specifically for their use of ATT&amp;CK techniques. Based on this research, the top 10 techniques in ransomware attacks are:<\/p>\n<h2>Organization-specific top techniques list via web calculator<\/h2>\n<p>This collaborative project also included the creation of a <a href=\"https:\/\/top-attack-techniques.mitre-engenuity.org\/calculator\" target=\"_blank\" rel=\"noreferrer noopener\">dynamic, user-friendly calculator<\/a> for a more customizable, tailored top techniques list. This customizability allows organizations to have unique prioritization based on each organization\u2019s size and maturity.<\/p>\n<p>The calculator takes into consideration various inputs, including:<\/p>\n<ul>\n<li>NIST 800-53 Controls (all NIST controls or specific ones such as AC-2, CA-2, etc.)<\/li>\n<li>CIS Security Controls (all CIS Controls or specific ones such as 1.1, 2.5, etc.)<\/li>\n<li>Detection analytics (<a href=\"https:\/\/car.mitre.org\/analytics\/\" target=\"_blank\" rel=\"noreferrer noopener\">MITRE Cyber Analytics Repository<\/a>, Elastic, Sigma, Splunk)<\/li>\n<li>Operating systems used in the environment<\/li>\n<li>Monitoring capabilities for network, process, file, and cloud services in the network<\/li>\n<\/ul>\n<p>With this calculator, an organization can create a tailored technique list based on various aspects like the maturity of their security operations and the tools that they use. This can serve as a great starting point for companies looking to evaluate and improve their detection and protection capabilities regarding ransomware activities and prioritize the TTPs that are the most actionable for them.<\/p>\n<h2>Practical applications and future work<\/h2>\n<p>The methodology and insights from the top techniques list has many practical applications, including helping prioritize activities during triage. As it\u2019s applied to more real-world scenarios, we can identify areas of focus and continue to improve our coverage on these TTPs and behaviors of prevalent threat actors. Refining the criteria can further increase results accuracy and make this project more customer-focused and more relevant for their immediate action. Improvements in the following areas can be of particular benefit:<\/p>\n<ul>\n<li>Fine-tuning the choke point analysis by adding machine learning models to visualize and predict all viable paths an attacker could take, which can be used to create a corresponding attack graph. This attack graph could be tied in with the user-implemented filters to identify relevant paths based on an organization\u2019s current functionality. Future integration with the <a href=\"https:\/\/ctid.mitre-engenuity.org\/our-work\/attack-flow\/\" target=\"_blank\" rel=\"noreferrer noopener\">Attack Flow project<\/a> might be a step towards this enhanced choke point analysis.<\/li>\n<li>Developing a metric to identify subjective filters like \u201cDamage Impact\u201d and \u201cSignificance\u201d as they are important when making decisions on covering different attacks.<\/li>\n<li>Performing a comparison of results between this current analysis and global data sets to validate the accuracy of the current findings.<\/li>\n<li>Enhancing prevalence data to ensure a broad and timely data set is driving the analysis. Community contributions to the Sightings Ecosystem project is critical.<\/li>\n<\/ul>\n<p>Insights from industry-wide collaborations like this project help enrich the protection that Microsoft provides for customers through solutions like <a href=\"https:\/\/www.microsoft.com\/security\/business\/threat-protection\/microsoft-365-defender\">Microsoft 365 Defender<\/a> and <a href=\"https:\/\/azure.microsoft.com\/services\/microsoft-sentinel\/\">Microsoft Sentinel<\/a>. These solutions are further informed by trillions of signals that Microsoft processes every day, as well as our expert monitoring of the threat landscape. For example, our comprehensive view and research into the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/05\/09\/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself\/\">ransomware ecosystem<\/a> enables us to deliver <a href=\"https:\/\/aka.ms\/ransomware\">cross-domain defense<\/a> against human-operated ransomware, leveraging a <a href=\"https:\/\/docs.microsoft.com\/en-us\/security\/zero-trust\/\">Zero Trust<\/a> approach to limit the attack surface and minimize the chances of ransomware attacks succeeding.&nbsp;<\/p>\n<p>In the recent <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/04\/05\/microsoft-365-defender-demonstrates-industry-leading-protection-in-the-2022-mitre-engenuity-attck-evaluations\/\">MITRE Engenuity ATT&amp;CK\u00ae 2022 Evaluations<\/a>, Microsoft demonstrated complete visibility and analytics on all stages of the attack chain, with 100% protection coverage, blocking all stages in early steps (pre-ransomware phase), including techniques within the top 10 ransomware techniques list that were tested.<\/p>\n<p>This collaboration and innovation benefits everyone in the security community, not only those who use the MITRE ATT&amp;CK framework as part of their products and services, but also our valued ecosystem of partners who build services on top of our platform to meet the unique needs of every organization, to advance threat-informed defense in the public interest. Microsoft is a research sponsor at the Center for Threat-Informed Defense, partnering to advance the state of the art in threat-informed defense in the public interest. One of our core principles at Microsoft is security for all, and we will continue to partner with MITRE and the broader community to collaborate on projects like this and share insights and intelligence.<\/p>\n<p><em><strong>Gierael Ortega, Alin Nagraj, Devin Parikh<\/strong><br \/>Microsoft 365 Defender Research Team<\/em><\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/05\/11\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Center for Threat-Informed Defense, along with Microsoft and industry partners, collaborated on a repeatable methodology and a web-based calculator, aiming to streamline MITRE ATT&#038;CK\u00ae use for defenders.<br \/>\nThe post Center for Threat-Informed Defense, Microsoft, and industry partners streamline MITRE ATT&#038;CK\u00ae matrix evaluation for defenders appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":46599,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[8927,347,8549,7221,8928,91],"class_list":["post-46598","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-center-for-threat-informed-defense","tag-cybersecurity","tag-human-operated-ransomware","tag-microsoft-security-intelligence","tag-mitre-attck","tag-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Center for Threat-Informed Defense, Microsoft, and industry partners streamline MITRE ATT&amp;CK\u00ae matrix evaluation for defenders 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Center for Threat-Informed Defense, Microsoft, and industry partners streamline MITRE ATT&amp;CK\u00ae matrix evaluation for defenders 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-11T16:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/05\/Figure-1-Attacks-over-time-627ad76ff17a7.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Center for Threat-Informed Defense, Microsoft, and industry partners streamline MITRE ATT&amp;CK\u00ae matrix evaluation for defenders\",\"datePublished\":\"2022-05-11T16:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders\\\/\"},\"wordCount\":1233,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders.png\",\"keywords\":[\"Center for Threat-Informed Defense\",\"Cybersecurity\",\"human-operated ransomware\",\"Microsoft security intelligence\",\"MITRE ATT&amp;CK\",\"ransomware\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders\\\/\",\"name\":\"Center for Threat-Informed Defense, Microsoft, and industry partners streamline MITRE ATT&amp;CK\u00ae matrix evaluation for defenders 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders.png\",\"datePublished\":\"2022-05-11T16:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders.png\",\"width\":720,\"height\":287},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Center for Threat-Informed Defense\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/center-for-threat-informed-defense\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Center for Threat-Informed Defense, Microsoft, and industry partners streamline MITRE ATT&amp;CK\u00ae matrix evaluation for defenders\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Center for Threat-Informed Defense, Microsoft, and industry partners streamline MITRE ATT&amp;CK\u00ae matrix evaluation for defenders 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders\/","og_locale":"en_US","og_type":"article","og_title":"Center for Threat-Informed Defense, Microsoft, and industry partners streamline MITRE ATT&amp;CK\u00ae matrix evaluation for defenders 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-05-11T16:00:00+00:00","og_image":[{"url":"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/05\/Figure-1-Attacks-over-time-627ad76ff17a7.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Center for Threat-Informed Defense, Microsoft, and industry partners streamline MITRE ATT&amp;CK\u00ae matrix evaluation for defenders","datePublished":"2022-05-11T16:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders\/"},"wordCount":1233,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders.png","keywords":["Center for Threat-Informed Defense","Cybersecurity","human-operated ransomware","Microsoft security intelligence","MITRE ATT&amp;CK","ransomware"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders\/","url":"https:\/\/www.threatshub.org\/blog\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders\/","name":"Center for Threat-Informed Defense, Microsoft, and industry partners streamline MITRE ATT&amp;CK\u00ae matrix evaluation for defenders 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders.png","datePublished":"2022-05-11T16:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders.png","width":720,"height":287},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/center-for-threat-informed-defense-microsoft-and-industry-partners-streamline-mitre-attck-matrix-evaluation-for-defenders\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Center for Threat-Informed Defense","item":"https:\/\/www.threatshub.org\/blog\/tag\/center-for-threat-informed-defense\/"},{"@type":"ListItem","position":3,"name":"Center for Threat-Informed Defense, Microsoft, and industry partners streamline MITRE ATT&amp;CK\u00ae matrix evaluation for defenders"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46598","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=46598"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46598\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/46599"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=46598"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=46598"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=46598"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}