Blog

Guarding the Grid: Defending Operational Technology With ATT&CK

Guarding the Grid: Defending Operational Technology With ATT&CK

By Adrian Garcia Gonzalez and Tiffany Bergeron • August 14, 2024

Project banner

Critical infrastructure such as electrical generation facilities, water treatment plants, and transportation systems are a lifeline for our communities. Unfortunately, this dependence has made critical infrastructure a prime target for threat actors. Furthermore, these systems often lack security measures we see in enterprise networks, making them easier to attack. By identifying the threat landscape and communicating adversary behaviors affecting information technology (IT) and operational technology (OT) systems, organizations can evaluate and employ security controls for real-world adversary behaviors targeting those environments.

In collaboration with AttackIQ, Booz Allen Hamilton, Ensign InfoSecurity, Global Cyber Alliance and Siemens, the Center for Threat-Informed Defense created Defending OT with ATT&CK to identify and defend against adversarial techniques that impact operations on critical infrastructure. We created three resources to identify assets and technologies in complex IT/OT environments and present an approach to comprehensively identify adversarial behaviors targeting those systems.

  • A threat model methodology
  • A reference architecture
  • A threat collection of unique adversary behaviors

This information is essential to implement defensive measures against the techniques that adversaries use against critical infrastructure.

Threat Model Methodology

To ensure a thorough analysis and documentation of potential adversarial techniques, this research project developed a methodology to model threats to a hybrid IT/OT environment that includes multiple domains and provides a customizable and repeatable framework for analyzing and building threat collections. The methodology expands the Center’s Defending IaaS with ATT&CK approach by presenting a comprehensive view of adversary behavior that could impact overall operations within a hybrid IT/OT environment.

For Defending OT with ATT&CK, we applied this methodology to identify the assets that constitute the attack surface of a hybrid IT/OT environment. From these assets we developed the reference architecture. We then established selection criteria to assess the threats posed by each one of these technologies based on relevant factors, such as operating system risks or industrial control system (ICS) processes affected.

Step 1. Identify Attack Surface

Identify security boundaries and understand the technologies that form their architecture.

Step 2. Compile Sources

Generate a comprehensive picture of adversarial risks; it is necessary to include CTI sources for the listed assets.

Step 3. Define Selection Criteria

Identify which adversarial risks apply to your scenario and asset and omit irrelevant sources.

Step 4. Select Techniques

Review and evaluate adversarial techniques for each asset to curate the final collection.

Step 5. Build Collection

Assemble the techniques into a custom threat collection to share throughout your organization.

Reference Architecture

To determine the attack surface where a threat actor can generate a cyber effect, we developed a reference architecture that aligns with the Purdue Model to visualize the technologies within a IT/OT environment. In defining architectural assets, we considered several factors to ensure comprehensive coverage of risks.

  • Evaluate the boundaries between IT and OT systems
  • Identifying relevant attack vectors
  • Understand the adversary’s goals when targeting assets that could disrupt or impact operations.

This reference architecture provides a common, reusable view of assets and technologies used in IT/OT environments where a threat actor can impact operations. It serves as a framework for depicting assets through functional components across the technology stack of an OT environment in hierarchical levels. All assets depicted in the architecture were mapped to ATT&CK for Enterprise’s platforms or ATT&CK for ICS’ assets, with nine hybrid assets overlapping techniques from multiple domains of ATT&CK. The architecture aids in evaluating security boundaries between different operational zones and assessing plausible attack vectors between IT and OT assets.

Defending OT with ATT&CK Reference Architecture
Defending OT with ATT&CK Reference Architecture

Multi-Domain Threat Collection

The Defending OT with ATT&CK threat collection is a set of ATT&CK techniques tailored to the attack surface and threat model for OT environments. To identify and define this multi-domain collection, we analyzed adversarial tactics, techniques, and procedures (TTPs) as contained in ATT&CK for Enterprise, ATT&CK for ICS, and other relevant ATT&CK datasets such as Cloud and Containers. The threat collection is designed to evaluate, plan, and employ mitigating security controls for adversarial techniques within an IT/OT architecture.

We utilized the Center’s ATT&CK Workbench to build a custom collection of threats based on a compilation of real-world adversary behaviors documented in ATT&CK v15. ATT&CK Workbench provides the flexibility and customization needed to identify specific adversarial risks associated with the 20 architectural assets outlined in the reference architecture. This process resulted in a comprehensive threat collection comprising 251 techniques and 441 sub-techniques. ATT&CK Workbench streamlined the analysis of threats and facilitated the communication of various risks for each asset. Additionally, we created a custom threat collection that can be exported and shared as a STIX bundle.

ATT&CK Workbench
Threat collection for Defending OT with ATT&CK’s Assets in Workbench

Organizations looking to tailor research for specific needs can view the collection of techniques using the latest version of ATT&CK Workbench. These resources offer a template for organizations looking to extend our approach for their intended use cases, including:

  • Threat Intelligence Mapping: Leverage real-world threats to understand how adversarial behaviors might impact assets across an environment.
  • Red Teaming and Penetration Testing: Conduct strategic adversarial simulation and scenarios to comprehensively evaluate real-world risk across the attack surface.
  • Security Architecture and Operations: Develop capabilities for effective threat hunting, response to malicious activity, and eradicating threats within an IT/OT ecosystem.
  • Collaborative Cyber Tabletop Exercises: Assess adversarial risks and compare them with the organization’s existing security technologies.

Get Involved

There are several ways that you can get involved with this project and help advance threat-informed defense. Please review the project resources, use them, and tell us what you think.

We welcome your contributions to help advance Defending OT with ATT&CK in the form of pull requests; please review the contributor notice before making a pull request.

For any technical questions or requests, please submit issues on GitHub . You may also contact ctid@mitre.org directly for more general inquiries about the Center for Threat-Informed Defense.

© 2024 MITRE. Approved for Public Release. Document number CT0121.


About the Author

Tiffany Bergeron

As the Chief Mappings architect, Tiffany oversees all Center projects related to MITRE ATT&CK mappings, including the Mappings Explorer website, security platform mappings, and security control framework mappings.

More by Tiffany Bergeron

Recent Blog Posts:

Threat-Informed Defense is a Mindset, Not a Technique

The Center for Threat-Informed Defense has published the results of three new projects so far in 2025, as well as three updates within the corpus …

Continue reading

Put Your Money Where Your Adversaries Are: Exploited Vulnerabilities

Historically, vulnerability management and threat management have been separate disciplines, but in a risk-focused world, they need to be brought …

Continue reading

Stacked Defense from the Hardware Up

The Security Stack Mappings – Hardware-Enabled Defense project demonstrates full stack threat-informed defense, from the hardware board to the …

Continue reading