← Home / ATT&CK

MITRE ATT&CK Coverage Matrix

OSA control coverage mapped against 967 ATT&CK Enterprise techniques across 14 tactics, built from the TRIDENT graph model. Color indicates mitigation density — the number of NIST 800-53 controls addressing each technique. Select a threat group to isolate their TTPs and explore the defense, detection, and weakness data for each technique.

TRIDENT Graph 108 mitigations | 1060 detection strategies | 18442 weakness classes | 171 threat groups | 242,334 graph edges | Sources: CTID, ATT&CK v18.1, CAPEC v3.9
967
Techniques Tracked
49%
With Coverage
388
Well Covered (6+)
498
No Coverage
Coverage: None (0) Low (1-2) Medium (3-5) High (6+)
Subtechniques (click to expand): +3 Colour indicates lowest coverage level
Isolates adversary TTPs
Filter by ID or name
Reconnaissance
45 techniques
Resource Development
47 techniques
Initial Access
45 techniques
Execution
61 techniques
Persistence
142 techniques
Privilege Escalation
117 techniques
Defense Evasion
249 techniques
Credential Access
77 techniques
Discovery
67 techniques
Lateral Movement
32 techniques
Collection
76 techniques
Command & Control
65 techniques
Exfiltration
22 techniques
Impact
56 techniques

Defense

Detection

Weaknesses

Threat Actors

Patterns