What is MITRE ATT&CK for ICS?

MITRE ATT&CK for ICS is a threat model and knowledge base specifically aimed at cyber attacks on industrial control systems (ICS). It describes how attackers behave within OT environments — from gaining access to disrupting production processes.

ATT&CK for ICS helps organisations to understand, detect and prevent attacks within critical infrastructure such as factories, power stations and water utilities.


🧠 How does ATT&CK for ICS work?

  1. The model is built around tactics (attacker objectives) and techniques (how those objectives are achieved)
  2. Each technique includes information on:
  • A description of the behaviour
  • Use by known threat actors
  • Detection and mitigation strategies
  1. Examples of tactics include:
  • Initial Access
  • Execution
  • Inhibit Response Function
  • Impact
  1. The database is continuously updated by MITRE, based on real-world attack scenarios and threat intelligence

ATT&CK for ICS is specifically focused on Operational Technology (OT) — in contrast to the classic ATT&CK, which is focused on IT.


🏭 Application of ATT&CK for ICS in industrial networks

ATT&CK for ICS is widely used by industrial organisations, governments and CERT teams.


🔍 Example techniques from ATT&CK for ICS

Tactic Technique (example) Description
Initial Access Valid Accounts Misuse of valid user accounts
Inhibit Response Function Alarm Suppression Alarms are disabled or ignored
Execution Command-Line Interface Executing commands on an Engineering Station
Impact Loss of View Loss of process visibility (HMI disabled)
Collection Screen Capture Covertly capturing screenshots of HMI or SCADA screens

🔐 Security considerations

Familiarity with these techniques helps you recognise attacks more quickly and respond more effectively.


📌 In summary

MITRE ATT&CK for ICS is a global standard for understanding and combating attacks on industrial networks. It is an essential tool for anyone seeking to secure OT infrastructures against advanced threats.