Blog

Cloud Security Built with ATT&CK

Cloud Security Built with ATT&CK

By Tiffany Bergeron and Daniel Bah • January 28, 2026

Project banner

Threats to cloud computing span multiple security domains, objectives, and layers of technology. Defenders must protect dynamic, shared environments while adversaries actively exploit misconfigurations, weak controls, and gaps between responsibility boundaries. To keep up, security cannot just focus on how controls are documented. It has to focus on how real adversaries operate in cloud environments.

MITRE’s Center for Threat-Informed Defense (CTID) applies a threat-informed approach that aligns organizations’ security capabilities to real adversary behaviors, connecting specific security controls to adversary tradecraft. As a result, defenders prioritize investments, validate defensive coverage, and assess risk based on observed attack activity.

With CTID members Citigroup, Cloud Security Alliance, CrowdStrike, Fortinet, and JPMorgan Chase Bank N.A., we mapped cloud-native security controls and capabilities to adversary techniques and behaviors documented in MITRE ATT&CK® to design and assess cloud defenses.

We used the Cloud Security Alliance Cloud Controls Matrix (CCM) as the control framework in this effort. The CCM provides a comprehensive set of cloud security controls that address technical and operational aspects of cloud computing across shared responsibility models. By mapping the CCM to ATT&CK techniques, we demonstrate how these industry-recognized cloud controls can mitigate specific adversary behaviors.

The CCM mapping resources, including the mappings themselves, ATT&CK Navigator layers, and the mapping methodology, are all available on our Mappings Explorer website. With these mappings, users will:

  • Identify which ATT&CK techniques are mitigated by specific CCM controls.
  • Align control design and implementation with adversary behaviors documented in ATT&CK.
  • Reference relevant ATT&CK techniques when building, validating, or testing CCM-based security controls.
  • Apply a structured, threat-informed foundation to cloud-native mitigations, threat modeling, and security assessments.

Our Approach

We followed our established methodology to connect security capabilities to ATT&CK. This methodology reflects our experience mapping multiple security frameworks and provides a repeatable way to use ATT&CK to understand how security capabilities mitigate adversary behavior. Using this methodology, we mapped the CCM v4.1 controls to ATT&CK v17.1 techniques and sub-techniques. We identified more than 200 controls across 17 cloud security domains as providing in-scope capabilities, including Application and Interface Security (AIS), Data Security and Privacy Lifecycle Management (DSP), Infrastructure Security (I&S), and Threat and Vulnerability Management (TVM). This work resulted in more than 900 mappings connecting the CCM to ATT&CK techniques and sub-techniques those controls can help mitigate.

The methodology is iterative and consists of four steps, shown in the diagram below. Each step builds on the previous one, allowing analysts to understand a control’s mitigating capabilities and then map those capabilities to relevant ATT&CK techniques and sub-techniques.

We first identified security capabilities in scope. We then examined the in-scope controls in the context of ATT&CK mitigations and specific techniques and sub-techniques. From that analysis, we created mappings that connect each control to the ATT&CK techniques it helps mitigate.

CTID mapping methodology diagram
Our mapping methodology

Threat Mitigation Through Cloud Security Controls

By applying CTID’s mapping methodology alongside the CCM documentation and its threat-focused implementation guidance, we mapped the CCM to specific adversary behaviors documented in ATT&CK.

As an example, the CCM control Automated Application Security Testing (AIS-05) requires both cloud service providers and customers to implement testing strategies for their applications. The AIS-05 implementation guidance explicitly describes the types of threats these testing strategies should address, including:

  • Use automated scanners to detect hardcoded or default secrets, keys, and credentials.
  • Run vulnerability scanners to identify issues in third-party libraries.
  • Apply dynamic application security testing methods for session hijacking and injection attacks.
  • Perform input validation to detect SQL injection and command injection.

AIS-05 focuses on testing for different types of attacks and aligning with industry standards to improve application security. Following this guidance can mitigate up to 20 ATT&CK techniques and sub-techniques, including Supply Chain Compromise: Compromise Software Dependencies and Development Tools (T1195.001) for Initial Access and Command and Scripting Interpreter: Cloud API (T1059.009) for Execution.

Example mappings for AIS-05, showing how a control maps to ATT&CK tactics that then map to specific techniques
Example mappings for AIS-05.

Threat-Informed Defensive Countermeasures

These mappings align the CCM with cloud exploitation techniques and adversary operations. Use them and your organization will identify effective countermeasures and improve its cloud security posture.

For example, Pacu is an open-source AWS exploitation framework used by both red teams and threat actors to exploit cloud misconfigurations. Pacu exercises multiple ATT&CK techniques, including Credentials from Password Stores: Cloud Secrets Management Stores (T1555.006) and Account Manipulation: Additional Cloud Credentials (T1098.001).

By using Mappings Explorer to examine the CCM to ATT&CK mappings, defenders identify controls that prevent or disrupt the capabilities used in Pacu. The mappings also provide rationale that explains how each control mitigates the associated adversary technique, as shown below.

CCM mappings for T1555.006
CCM for Credentials from Password Stores: Cloud Secrets Management Stores (T1555.006).
CCM mappings for T1098.001
CCM controls for Account Manipulation: Additional Cloud Credentials (T1098.001).

Speak a Common Language

By connecting the CCM to ATT&CK, organizations gain a common language that enables teams to work together, like the following scenarios:

  1. CTI analysts produce ATT&CK-based threat intelligence.
  2. Offensive SecOps teams identify and validate ATT&CK-based detections in use.
  3. Defensive detection engineers implement CCM countermeasures for observed threats.
  4. Security officers assess risk and align threat management with business objectives.

This shared foundation strengthens coordination across teams and helps organizations apply threat-informed defense consistently across cloud environments.

Get Involved

We welcome your feedback and contributions. There are several ways that you can get involved with this and other mapping projects to help advance threat-informed defense:

  • Review the mappings, use them, and tell us what you think. We welcome your review and feedback on CSA CMM mappings, our methodology, and resources.
  • Prioritize additional platforms to map. Let us know what platforms you would like to see mapped to ATT&CK. Your input will help us prioritize how we expand our mappings.
  • Share your ideas. Share your ideas or suggestions for additional tools and resources for helping the community to understand and make threat-informed decisions.

You are also welcome to submit issues for any technical questions or concerns, or contact us directly for more general inquiries.


© 2026 The MITRE Corporation. Approved for Public Release. ALL RIGHTS RESERVED. Document number 26-0127.


About the Author

Tiffany Bergeron

As the Chief Mappings architect, Tiffany oversees all Center projects related to MITRE ATT&CK mappings, including the Mappings Explorer website, security platform mappings, and security control framework mappings.

More by Tiffany Bergeron

Recent Blog Posts:

Cloud Security Built with ATT&CK

Threats to cloud computing span multiple security domains, objectives, and layers of technology. Defenders must protect dynamic, shared …

Continue reading

From Insight to Impact: INFORM your Defense

INFORM builds on M3TID to translate threat intelligence, defensive measures, and test & evaluation into a measurable, repeatable practice. …

Continue reading

Get in Sync with ATT&CK and CTID

Threat-informed defenders can use ATT&CK Sync and the enhanced Mappings Editor to keep ATT&CK-based tools and mappings current with major …

Continue reading