In our last blog post, we explored how the MITRE ATT&CK® framework can help sharpen your cybersecurity strategy. We focused on identifying threats that truly matter and applying that knowledge practically across your security program.
Today, we are digging deeper into two of the most important and foundational areas, Risk Assessments and Security Policies, and how the MITRE ATT&CK framework enhances them. We will cover what good looks like for each, why they matter, and how the framework can sharpen the focus and add real-world relevance.
At their core, risk assessments help organizations make informed decisions about where to spend time, money, and resources. A proper risk assessment gives you:
Without a strong risk assessment, security programs become reactive, often spending heavily on low-risk problems while missing the real material risks that could cause serious damage.
Risk assessments also help align cybersecurity with business strategy. Leadership is more likely to approve cybersecurity investments when they can clearly see how they reduce meaningful risk to revenue, operations, or reputation.
Many risk assessments struggle because they start with vague or generalized threat assumptions. MITRE ATT&CK improves the process by grounding it in observed attacker behavior rather than guesswork.
Here is how to apply it:
Step 1: Identify Relevant Threat Actors
Use the MITRE ATT&CK Groups list to find real-world threat actors that target your industry. For example, financial services firms should understand groups like FIN7 or Carbanak.
Step 2: Map Techniques to Your Assets
Look at the techniques those threat actors use and identify which ones are relevant to your systems. If ransomware groups commonly exploit remote desktop services, and you have legacy RDP servers exposed, you have a measurable risk.
Step 3: Cross-Reference with Control Frameworks
Tie each identified risk to a requirement in frameworks like:
Step 4: Document Specific, Actionable Risks
Instead of documenting “Risk of cyber-attack,” capture specific risks like “Risk of ransomware infection through Remote Desktop Protocol exploitation by groups such as FIN7.”
Scenario:
A manufacturing company conducted annual risk assessments based on hypothetical threats, but they missed real-world credential theft techniques that were increasingly common in their sector.
After incorporating MITRE ATT&CK, they identified specific techniques like OS Credential Dumping (T1003).
They asked two important questions:
Cross-Referencing Credential Dumping with NIST CSF:
Credential dumping directly threatens account integrity and privileged access, which can be mapped to:
Measuring Risk:
They assessed the likelihood of credential dumping by examining:
They assessed impact by evaluating:
This structured mapping allowed them to assign a quantitative risk score that reflected both the likelihood (based on current controls) and impact (based on system criticality).
Remediation Steps Included:
After implementing these changes, they reduced credential theft incidents by 60 percent in one year and improved their overall NIST CSF maturity scores under PR.AC and DE.CM categories.
Not every adversary technique fits neatly into existing frameworks like NIST CSF. Some attacker behaviors are broader, multi-phase, or exploit organizational processes in ways that require extra attention.
Example from FIN7:
One of FIN7’s known techniques involves highly targeted social engineering and phone-based vishing campaigns, where attackers impersonate company executives or IT staff to convince employees to perform actions like installing remote access software.
While aspects of this can be related to the PR.AT-1 (all users are informed and trained) category, the nuance of phone-based social engineering is often underspecified in NIST CSF. Training coverage requirements are broad and may not require simulation or awareness reinforcement around advanced vishing techniques.
How to Augment:
Organizations should create additional sub-controls or training enhancements such as:
These augmentations should be logged as part of security awareness improvements and reflected in governance reporting.
Security policies are the rulebook that defines how an organization protects its people, data, and systems.
Good security policies provide:
However, many policies suffer from being too generic. They list “best practices” without connecting them to the actual threats the organization faces, which leaves gaps attackers can exploit.
The ATT&CK framework allows organizations to move from generic to specific by tying security policies directly to real-world tactics and techniques used by adversaries.
Here is how to apply it:
Step 1: Identify the Threats Your Policies Should Address
For example, if data exfiltration over encrypted channels is a real threat to your organization, your network monitoring policies need to explicitly address detection of encrypted traffic anomalies.
Step 2: Anchor Policy Language to Tactics and Techniques
Example:
Step 3: Cross-Reference with Compliance Frameworks
For stronger validation, map policies to:
Step 4: Eliminate Ambiguities
Effective policies clearly state:
Once you apply ATT&CK to risk assessments and policies, it is important to validate the impact.
Risk Assessments:
Security Policies:
Risk assessments and security policies are not check-the-box exercises, they are the foundation for building an intelligent, defensible cybersecurity program.
MITRE ATT&CK gives organizations a way to ensure that these documents are connected to the real threats they face, making every dollar and every control count.
However, consistently applying this level of discipline takes leadership focus and experience.
Sikich’s Executive Services team, including our vCISO program, partners with organizations to build and mature cybersecurity programs based on real-world threat intelligence.
We meet with your leadership team regularly, apply frameworks like MITRE ATT&CK, NIST CSF, and SCF to your risk assessments, management, and security policy development processes, and help you drive real, measurable cybersecurity maturity without the full-time executive cost.
Let us help you make your cybersecurity program strategic, practical, and defensible. Reach out to us today to discuss how our Executive Services can support your security goals.
This publication contains general information only and Sikich is not, by means of this publication, rendering accounting, business, financial, investment, legal, tax, or any other professional advice or services. This publication is not a substitute for such professional advice or services, nor should you use it as a basis for any decision, action or omission that may affect you or your business. Before making any decision, taking any action or omitting an action that may affect you or your business, you should consult a qualified professional advisor. In addition, this publication may contain certain content generated by an artificial intelligence (AI) language model. You acknowledge that Sikich shall not be responsible for any loss sustained by you or any person who relies on this publication.