MITRE ATT&CK Coverage Mapper

Detection Coverage per Tactic

Recon
Resource Dev
Init Access
Execution
Persistence
Priv Esc
Def Evasion
Cred Access
Discovery
Lat Movement
Collection
C2
Exfiltration
Impact

Deployed Security Tools

Overall Coverage Score0%
Full Coverage0
Partial Coverage0
No Coverage14

Coverage per Tactic

ReconResource DevInit AccessExecutionPersistencePriv EscDef EvasionCred AccessDiscoveryLat MovementCollectionC2ExfiltrationImpact0%25%50%75%100%

Benchmark Comparison

0%
Your Score
25%
Industry Low
48%
Industry Avg
72%
Industry High

Critical. Minimal detection coverage. Immediate investment in security tooling and monitoring is needed.

Coverage Heatmap

Reconnaissance
0%
Resource Development
0%
Initial Access
0%
Execution
0%
Persistence
0%
Privilege Escalation
0%
Defense Evasion
0%
Credential Access
0%
Discovery
0%
Lateral Movement
0%
Collection
0%
Command and Control
0%
Exfiltration
0%
Impact
0%

Kill Chain Coverage

Pre-Attack0%
Recon, Resource Dev
Initial Compromise0%
Init Access, Execution
Establish Foothold0%
Persistence, Priv Esc, Def Evasion
Internal Recon & Movement0%
Cred Access, Discovery, Lat Movement
Mission Execution0%
Collection, C2, Exfiltration, Impact

Coverage Improvement Roadmap

Tools not yet deployed, ranked by potential coverage improvement:

ToolCoverage GainTactics Improved
SIEM93%Recon, Init Access, Execution, Persistence, Priv Esc, Def Evasion, Cred Access, Discovery, Lat Movement, Collection, C2, Exfiltration, Impact
EDR43%Execution, Persistence, Priv Esc, Def Evasion, Cred Access, Discovery
CASB29%Init Access, Collection, Exfiltration, Def Evasion
IAM29%Init Access, Persistence, Priv Esc, Cred Access
NDR29%Recon, Lat Movement, C2, Exfiltration
WAF21%Recon, Init Access, Impact
DLP21%Collection, Exfiltration, Impact

Detection Rule Suggestions

TacticTechnique IDTechniqueData SourceDetection LogicTool
ReconnaissanceT1595Active ScanningNetwork flow logsMonitor for port scanning patterns and high-frequency connection attempts from single sourcesNDR
ReconnaissanceT1598Phishing for InformationEmail gateway logsDetect emails with credential harvesting links or suspicious attachments from unknown sendersSIEM
Resource DevelopmentT1586Compromise AccountsIAM audit logsAlert on logins from compromised credential databases, impossible travel, or new device fingerprintsIAM
Initial AccessT1566PhishingEmail headers, URL reputationFlag emails with mismatched sender domains, suspicious URLs, or known malicious attachment hashesSIEM
Initial AccessT1190Exploit Public-Facing AppWAF logs, IDS alertsDetect exploit attempts against public-facing applications (SQLi, XSS, RCE patterns)WAF
Initial AccessT1133External Remote ServicesVPN/RDP access logsAlert on remote access from unusual geolocations or outside business hoursIAM
Initial AccessT1078Valid AccountsAuthentication logsDetect credential stuffing, password spraying, or use of default/shared accountsIAM
ExecutionT1059Command and Scripting InterpreterProcess creation logsMonitor for cmd.exe, powershell.exe, wscript.exe spawned by unusual parent processesEDR
ExecutionT1204User ExecutionEndpoint telemetryDetect file execution from email attachments, browser downloads in temp directoriesEDR
PersistenceT1547Boot/Logon AutostartRegistry monitoringAlert on modifications to Run/RunOnce keys, startup folders, or scheduled tasksEDR
Page 1 of 4

Priority Techniques to Cover

T1595: Active Scanning(Reconnaissance)
none
T1598: Phishing for Information(Reconnaissance)
none
T1586: Compromise Accounts(Resource Development)
none
T1566: Phishing(Initial Access)
none
T1190: Exploit Public-Facing App(Initial Access)
none
T1133: External Remote Services(Initial Access)
none
T1078: Valid Accounts(Initial Access)
none
T1059: Command and Scripting Interpreter(Execution)
none
T1204: User Execution(Execution)
none
T1547: Boot/Logon Autostart(Persistence)
none
T1053.2: Scheduled Task(Persistence)
none
T1136: Create Account(Persistence)
none
T1068: Exploitation for Privilege Escalation(Privilege Escalation)
none
T1548: Abuse Elevation Control(Privilege Escalation)
none
T1078.2: Valid Accounts: Domain(Privilege Escalation)
none