Access the MITRE ATT&CK Framework with Polarity Reference Channels

Product May 11, 2020

Today’s post continues an ongoing series on Polarity User Tips. Data tells a story, Polarity helps you see it with Augmented Reality overlaying contextual information as you work, giving you the right data at the right time to make informed decisions and take action with speed. This guide explains how you can see the story in your data with Polarity using the MITRE ATT&CK® Reference Channel.

What is the MITRE ATT&CK Framework?


MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community.

With the creation of ATT&CK, MITRE is fulfilling its mission to solve problems for a safer world — by bringing communities together to develop more effective cybersecurity. ATT&CK is open and available to any person or organization for use at no charge.

Intro to Polarity Reference Channels

Reference channels are a Polarity Channel that is based on another source of information that is used just for reference purposes by Polarity Users. Reference channels can be anything from a list of internal or external threats to a list of assets.

MITRE ATT&CK Reference Channels in Polarity

On the Polarity Github page, download the MITRE ATT&CK reference channel or browse our library of reference channels. Based on the ATT&CK framework, we have put together three reference channel CSVs: Groups, Tactics, and Techniques.

Simply upload any of the three frameworks that help your workflow to get the MITRE reference information available any time there is a group, tactic or technique on your screen.

See the reference channel in action

What Next?

See for yourself with a Polarity demo or trial. To learn more, take the Tour or tune into our next Community Tech Tuesday.