Security Stack Mappings – Hardware-Enabled Defense
The Security Stack Mappings – Hardware-Enabled Defense project demonstrates full stack threat-informed defense, from the hardware board to the …
January 4, 2025
The Security Stack Mappings – Hardware-Enabled Defense project demonstrates full stack threat-informed defense, from the hardware board to the software bytes.
The Hardware-Enabled Defense mappings are part of our Mappings Explorer program. Use the Mappings Explorer website to navigate, explore, search, and download our mappings of security capabilities to MITRE ATT&CK®.
System security is available at the hardware level to provide protection from adversarial threats; however, these countermeasures are not well known to security practitioners.
Apply the security stack mapping methodology to connect hardware security capabilities of standard enterprise-class systems to adversarial behaviors as described in MITRE ATT&CK®.
Cyber defenders apply hardware-assisted security features to counter specific adversarial threats and provide defense-in-depth of systems and data, better securing billions of devices.
The Security Stack Mappings – Hardware-Enabled Defense project demonstrates full stack threat-informed defense, from the hardware board to the …
Summiting the Pyramid (STP) creates a methodology to score analytics against the pyramid of pain, helping defenders create more robust detections …
A collaboration with MITRE ATLAS™ to advance security for AI–enabled systems that takes a threat-informed approach, enables rapid exchange of new …
Sign up for the Center's "Stay Informed" newsletter to get notified for new project releases and upcoming events.