Blog

Threat-Informed Defense for the Financial Sector

Threat-Informed Defense for the Financial Sector

By Gananand Kini, Tiffany Bergeron • June 16, 2025

Project banner

The Cyber Risk Institute (CRI) Profile is a distillation of the NIST Cybersecurity Framework (NIST CSF) tailored to address the financial services sector’s regulatory environment. Financial institutions, financial services companies, financial firms, and their third-party providers use the CRI Profile in their threat identification and management, risk assessments, and security control programs. In collaboration with Citigroup, JPMorgan Chase Bank N.A., and FS-ISAC, and in coordination with CRI, we connected the CRI Profile to the adversarial behaviors as described in MITRE ATT&CK®.

With the CRI Profile, financial institutions can see how the combined regulatory and other supervisory provisions provide security capabilities. With these mappings to ATT&CK, analysts will extend that connection to mitigations of specific adversary behaviors.

Specifically, users of these mappings will:

  • apply threat-informed analysis and decision-making to security control program design and implementation.
  • connect the design and implementation of controls to the adversary behaviors they must mitigate.
  • improve management and board reporting with respect to control investment and threat protection.

Find the CRI Profile mapping resources - the mappings themselves, ATT&CK Navigator layers, and the methodology - on our Mappings Explorer website. Mappings Explorer enables defenders to access and explore the mapped security capabilities for the CRI Profile (among other frameworks) from the perspective of the ATT&CK techniques they mitigate. These mappings unite the threat-informed approach to cybersecurity and the security controls perspective.

2100 Mappings to ATT&CK

The CRI Profile consolidates more than 2500 regulatory and other supervisory provisions into a framework of roughly 300 diagnostic statements. Each diagnostic statement (DS) is a specific, measurable objective that helps financial institutions assess and manage their cyber risks. We completed our mappings at the DS level, with consideration given for the function, category, and subcategory levels.

This project maps version 2.1 of the CRI Profile to ATT&CK v16.1 techniques and sub-techniques. We determined 60 DS to be in-scope in four functional areas of Identify, Protect, Detect, and Extend. This resulted in more than 2100 mappings to ATT&CK techniques and sub-techniques. The below figure depicts the CRI Profile coverage of all ATT&CK techniques — the darker the technique is, the more DS map to that technique.

ATT&CK Navigator View for the CRI Profile v2.1
ATT&CK Navigator View for the CRI Profile v2.1

Mapping CRI Profile DS to ATT&CK applies a threat-informed approach to financial institutions cybersecurity programs and provides threat data for security control implementation decisions.

Our Methodology

We followed our methodology for mapping framework security capabilities to ATT&CK. This methodology is based upon our experience mapping frameworks and platforms and aims to provide the community with a reusable method of using ATT&CK to determine the capabilities of security offerings.

The first step is to identify the security capabilities in scope, in this case the DS. We applied the following considerations to identify DS in scope:

  • Technical and operational implementation emphasis, not management specific capabilities focused on organizational policy or procedures
  • Mitigation of adversary behaviors (e.g., vulnerability remediation), not monitoring for behaviors (e.g., collect network traffic)
  • System-specific explicit technical mitigations (e.g., block USB devices), not non-technical methods (e.g., block physical access to system)

Once scoped, the mapping methodology is iterative.

  1. Examine the security capabilities provided by the in-scope DS
  2. Determine which adversary behavior the DS prevents in the context of ATT&CK mitigations and specific (Sub-)Techniques.
  3. Create mappings for those ATT&CK (sub-)techniques which the DS prevents.
CRI Mapping Methodology
CRI Mapping Methodology

Example Mappings

Data Loss Prevention

The CRI Profile under Protect: Data Security: Data loss prevention (PR.DS-01.02) provides for the implementation of technical controls to stop the loss and disclosure of sensitive information to outside attackers as well as inadvertent and malicious insiders. The implementation of data loss identification and prevention tools to monitor and protect against confidential data theft or destruction provides protection from adversary techniques related to data collection, data exfiltration, and data destruction, as depicted below.

Mappings for PR.DS-01.02 Data Loss Prevention
Mappings for PR.DS-01.02 Data Loss Prevention

Intrusion Detection and Prevention

The CRI Profile statement for Detect: Continuous Monitoring: Intrusion detection and prevention (DE.CM-01.01) implements capabilities to detect and prevent potential network intrusions. Having mechanisms such as restricting unnecessary network traffic, blocking legacy protocols, and using SSL/TLS inspection can help to limit adversary movement and data exfiltration techniques, as shown below.

Mappings for De.CM-01.01 Intrusion Detection and Prevention
Mappings for De.CM-01.01 Intrusion Detection and Prevention

Get Involved

Tell us how you are using our work! If you have any feedback, technical questions, concerns, or contributions you’d like to make to the project, email us at ctid@mitre.org

© 2025 MITRE. Approved for Public Release. Document number 25-1854.

Recent Blog Posts:

Threat-Informed Defense for the Financial Sector

The Cyber Risk Institute Profile is a distillation of the NIST Cybersecurity Framework tailored to address the financial services sector’s …

Continue reading

Ambiguous Techniques: Determine Malice through Context

An ambiguous technique is a MITRE ATT&CK® technique whose observable characteristics are insufficient to determine intent. This means that …

Continue reading

Fight Fraud with Threat-Informed Defense

In 2025, the Center for Threat-Informed Defense will develop the Fight Financial Fraud (F3) framework of tactics, techniques, and procedures …

Continue reading