Before an Attack

MITRE has curated a number of resources to aid you in preparing.

The end-to-end workflow consists of several steps, the precise steps can be customized to your specific situation.

These actions align with the NIST Cybersecurity Framework stages of Identify, Protect, and Detect.

In addition, collaboration with industry groups and public-private partnerships will give you greater insight into risks and potential mitigations.

NIST Cybersecurity Framework



  • Architecture
  • Operations
  • Device Pre-Certs
  • Deception
  • Data Security


  • Sensors
  • Analytics
  • Data Analysis
  • AI/ML
  • Alerting


  • Playbook
  • Targeted Analytics
  • Signature Dev’t
  • Resilience


  • Cleanup
  • Data Recovery
  • Reporting

Pin It on Pinterest

Share This