[](https://www.paloaltonetworks.com/?ts=markdown) * Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get Support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) ![x close icon to close mobile navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/x-black.svg) [![Palo Alto Networks logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg)](https://www.paloaltonetworks.com/?ts=markdown) ![magnifying glass search icon to open search field](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/search-black.svg) * [](https://www.paloaltonetworks.com/?ts=markdown) * Products ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Products [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [AI Security](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise Device Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical Device Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [OT Device Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex AgentiX](https://www.paloaltonetworks.com/cortex/agentix?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Exposure Management](https://www.paloaltonetworks.com/cortex/exposure-management?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Cortex Advanced Email Security](https://www.paloaltonetworks.com/cortex/advanced-email-security?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Unit 42 Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * Solutions ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Solutions Secure AI by Design * [Secure AI Ecosystem](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [Secure GenAI Usage](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) Network Security * [Cloud Network Security](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Data Center Security](https://www.paloaltonetworks.com/network-security/data-center?ts=markdown) * [DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Intrusion Detection and Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Device Security](https://www.paloaltonetworks.com/network-security/device-security?ts=markdown) * [OT Security](https://www.paloaltonetworks.com/network-security/ot-device-security?ts=markdown) * [5G Security](https://www.paloaltonetworks.com/network-security/5g-security?ts=markdown) * [Secure All Apps, Users and Locations](https://www.paloaltonetworks.com/sase/secure-users-data-apps-devices?ts=markdown) * [Secure Branch Transformation](https://www.paloaltonetworks.com/sase/secure-branch-transformation?ts=markdown) * [Secure Work on Any Device](https://www.paloaltonetworks.com/sase/secure-work-on-any-device?ts=markdown) * [VPN Replacement](https://www.paloaltonetworks.com/sase/vpn-replacement-for-secure-remote-access?ts=markdown) * [Web \& Phishing Security](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) Cloud Security * [Application Security Posture Management (ASPM)](https://www.paloaltonetworks.com/cortex/cloud/application-security-posture-management?ts=markdown) * [Software Supply Chain Security](https://www.paloaltonetworks.com/cortex/cloud/software-supply-chain-security?ts=markdown) * [Code Security](https://www.paloaltonetworks.com/cortex/cloud/code-security?ts=markdown) * [Cloud Security Posture Management (CSPM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-security-posture-management?ts=markdown) * [Cloud Infrastructure Entitlement Management (CIEM)](https://www.paloaltonetworks.com/cortex/cloud/cloud-infrastructure-entitlement-management?ts=markdown) * [Data Security Posture Management (DSPM)](https://www.paloaltonetworks.com/cortex/cloud/data-security-posture-management?ts=markdown) * [AI Security Posture Management (AI-SPM)](https://www.paloaltonetworks.com/cortex/cloud/ai-security-posture-management?ts=markdown) * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Cloud Workload Protection (CWP)](https://www.paloaltonetworks.com/cortex/cloud/cloud-workload-protection?ts=markdown) * [Web Application \& API Security (WAAS)](https://www.paloaltonetworks.com/cortex/cloud/web-app-api-security?ts=markdown) Security Operations * [Cloud Detection \& Response](https://www.paloaltonetworks.com/cortex/cloud-detection-and-response?ts=markdown) * [Security Information and Event Management](https://www.paloaltonetworks.com/cortex/modernize-siem?ts=markdown) * [Network Security Automation](https://www.paloaltonetworks.com/cortex/network-security-automation?ts=markdown) * [Incident Case Management](https://www.paloaltonetworks.com/cortex/incident-case-management?ts=markdown) * [SOC Automation](https://www.paloaltonetworks.com/cortex/security-operations-automation?ts=markdown) * [Threat Intel Management](https://www.paloaltonetworks.com/cortex/threat-intel-management?ts=markdown) * [Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Attack Surface Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/attack-surface-management?ts=markdown) * [Compliance Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/compliance-management?ts=markdown) * [Internet Operations Management](https://www.paloaltonetworks.com/cortex/cortex-xpanse/internet-operations-management?ts=markdown) * [Extended Data Lake (XDL)](https://www.paloaltonetworks.com/cortex/cortex-xdl?ts=markdown) * [Agentic Assistant](https://www.paloaltonetworks.com/cortex/cortex-agentic-assistant?ts=markdown) Endpoint Security * [Endpoint Protection](https://www.paloaltonetworks.com/cortex/endpoint-protection?ts=markdown) * [Extended Detection \& Response](https://www.paloaltonetworks.com/cortex/detection-and-response?ts=markdown) * [Ransomware Protection](https://www.paloaltonetworks.com/cortex/ransomware-protection?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/cortex/digital-forensics?ts=markdown) [Industries](https://www.paloaltonetworks.com/industry?ts=markdown) * [Public Sector](https://www.paloaltonetworks.com/industry/public-sector?ts=markdown) * [Financial Services](https://www.paloaltonetworks.com/industry/financial-services?ts=markdown) * [Manufacturing](https://www.paloaltonetworks.com/industry/manufacturing?ts=markdown) * [Healthcare](https://www.paloaltonetworks.com/industry/healthcare?ts=markdown) * [Small \& Medium Business Solutions](https://www.paloaltonetworks.com/industry/small-medium-business-portfolio?ts=markdown) * Services ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Services [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Assess](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [AI Security Assessment](https://www.paloaltonetworks.com/unit42/assess/ai-security-assessment?ts=markdown) * [Attack Surface Assessment](https://www.paloaltonetworks.com/unit42/assess/attack-surface-assessment?ts=markdown) * [Breach Readiness Review](https://www.paloaltonetworks.com/unit42/assess/breach-readiness-review?ts=markdown) * [BEC Readiness Assessment](https://www.paloaltonetworks.com/bec-readiness-assessment?ts=markdown) * [Cloud Security Assessment](https://www.paloaltonetworks.com/unit42/assess/cloud-security-assessment?ts=markdown) * [Compromise Assessment](https://www.paloaltonetworks.com/unit42/assess/compromise-assessment?ts=markdown) * [Cyber Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/cyber-risk-assessment?ts=markdown) * [M\&A Cyber Due Diligence](https://www.paloaltonetworks.com/unit42/assess/mergers-acquisitions-cyber-due-diligence?ts=markdown) * [Penetration Testing](https://www.paloaltonetworks.com/unit42/assess/penetration-testing?ts=markdown) * [Purple Team Exercises](https://www.paloaltonetworks.com/unit42/assess/purple-teaming?ts=markdown) * [Ransomware Readiness Assessment](https://www.paloaltonetworks.com/unit42/assess/ransomware-readiness-assessment?ts=markdown) * [SOC Assessment](https://www.paloaltonetworks.com/unit42/assess/soc-assessment?ts=markdown) * [Supply Chain Risk Assessment](https://www.paloaltonetworks.com/unit42/assess/supply-chain-risk-assessment?ts=markdown) * [Tabletop Exercises](https://www.paloaltonetworks.com/unit42/assess/tabletop-exercise?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Respond](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Cloud Incident Response](https://www.paloaltonetworks.com/unit42/respond/cloud-incident-response?ts=markdown) * [Digital Forensics](https://www.paloaltonetworks.com/unit42/respond/digital-forensics?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond/incident-response?ts=markdown) * [Managed Detection and Response](https://www.paloaltonetworks.com/unit42/respond/managed-detection-response?ts=markdown) * [Managed Threat Hunting](https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Unit 42 Retainer](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * [Transform](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [IR Plan Development and Review](https://www.paloaltonetworks.com/unit42/transform/incident-response-plan-development-review?ts=markdown) * [Security Program Design](https://www.paloaltonetworks.com/unit42/transform/security-program-design?ts=markdown) * [Virtual CISO](https://www.paloaltonetworks.com/unit42/transform/vciso?ts=markdown) * [Zero Trust Advisory](https://www.paloaltonetworks.com/unit42/transform/zero-trust-advisory?ts=markdown) [Global Customer Services](https://www.paloaltonetworks.com/services?ts=markdown) * [Education \& Training](https://www.paloaltonetworks.com/services/education?ts=markdown) * [Professional Services](https://www.paloaltonetworks.com/services/consulting?ts=markdown) * [Success Tools](https://www.paloaltonetworks.com/services/customer-success-tools?ts=markdown) * [Support Services](https://www.paloaltonetworks.com/services/solution-assurance?ts=markdown) * [Customer Success](https://www.paloaltonetworks.com/services/customer-success?ts=markdown) [![](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/logo-unit-42.svg) UNIT 42 RETAINER Custom-built to fit your organization's needs, you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial. Learn more](https://www.paloaltonetworks.com/unit42/retainer?ts=markdown) * Partners ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Partners NextWave Partners * [NextWave Partner Community](https://www.paloaltonetworks.com/partners?ts=markdown) * [Cloud Service Providers](https://www.paloaltonetworks.com/partners/nextwave-for-csp?ts=markdown) * [Global Systems Integrators](https://www.paloaltonetworks.com/partners/nextwave-for-gsi?ts=markdown) * [Technology Partners](https://www.paloaltonetworks.com/partners/technology-partners?ts=markdown) * [Service Providers](https://www.paloaltonetworks.com/partners/service-providers?ts=markdown) * [Solution Providers](https://www.paloaltonetworks.com/partners/nextwave-solution-providers?ts=markdown) * [Managed Security Service Providers](https://www.paloaltonetworks.com/partners/managed-security-service-providers?ts=markdown) * [XMDR Partners](https://www.paloaltonetworks.com/partners/managed-security-service-providers/xmdr?ts=markdown) Take Action * [Portal Login](https://www.paloaltonetworks.com/partners/nextwave-partner-portal?ts=markdown) * [Managed Services Program](https://www.paloaltonetworks.com/partners/managed-security-services-provider-program?ts=markdown) * [Become a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=becomepartner) * [Request Access](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerregistration?type=requestaccess) * [Find a Partner](https://paloaltonetworks.my.site.com/NextWavePartnerProgram/s/partnerlocator) [CYBERFORCE CYBERFORCE represents the top 1% of partner engineers trusted for their security expertise. Learn more](https://www.paloaltonetworks.com/cyberforce?ts=markdown) * Company ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Company Palo Alto Networks * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Management Team](https://www.paloaltonetworks.com/about-us/management?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com) * [Locations](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Ethics \& Compliance](https://www.paloaltonetworks.com/company/ethics-and-compliance?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Military \& Veterans](https://jobs.paloaltonetworks.com/military) [Why Palo Alto Networks?](https://www.paloaltonetworks.com/why-paloaltonetworks?ts=markdown) * [Precision AI Security](https://www.paloaltonetworks.com/precision-ai-security?ts=markdown) * [Our Platform Approach](https://www.paloaltonetworks.com/why-paloaltonetworks/platformization?ts=markdown) * [Accelerate Your Cybersecurity Transformation](https://www.paloaltonetworks.com/why-paloaltonetworks/nam-cxo-portfolio?ts=markdown) * [Awards \& Recognition](https://www.paloaltonetworks.com/about-us/awards?ts=markdown) * [Customer Stories](https://www.paloaltonetworks.com/customers?ts=markdown) * [Global Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Trust 360 Program](https://www.paloaltonetworks.com/resources/whitepapers/trust-360?ts=markdown) Careers * [Overview](https://jobs.paloaltonetworks.com/) * [Culture \& Benefits](https://jobs.paloaltonetworks.com/en/culture/) [A Newsweek Most Loved Workplace "Businesses that do right by their employees" Read more](https://www.paloaltonetworks.com/company/press/2021/palo-alto-networks-secures-top-ranking-on-newsweek-s-most-loved-workplaces-list-for-2021?ts=markdown) * More ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) More Resources * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Unit 42 Threat Research](https://unit42.paloaltonetworks.com/) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Tech Insider](https://techinsider.paloaltonetworks.com/) * [Knowledge Base](https://knowledgebase.paloaltonetworks.com/) * [Palo Alto Networks TV](https://tv.paloaltonetworks.com/) * [Perspectives of Leaders](https://www.paloaltonetworks.com/perspectives/?ts=markdown) * [Cyber Perspectives Magazine](https://www.paloaltonetworks.com/cybersecurity-perspectives/cyber-perspectives-magazine?ts=markdown) * [Regional Cloud Locations](https://www.paloaltonetworks.com/products/regional-cloud-locations?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Security Posture Assessment](https://www.paloaltonetworks.com/security-posture-assessment?ts=markdown) * [Threat Vector Podcast](https://unit42.paloaltonetworks.com/unit-42-threat-vector-podcast/) * [Packet Pushers Podcasts](https://www.paloaltonetworks.com/podcasts/packet-pusher?ts=markdown) Connect * [LIVE community](https://live.paloaltonetworks.com/) * [Events](https://events.paloaltonetworks.com/) * [Executive Briefing Center](https://www.paloaltonetworks.com/about-us/executive-briefing-program?ts=markdown) * [Demos](https://www.paloaltonetworks.com/demos?ts=markdown) * [Contact us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) [Blog Stay up-to-date on industry trends and the latest innovations from the world's largest cybersecurity Learn more](https://www.paloaltonetworks.com/blog/) * Sign In ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Sign In * Customer * Partner * Employee * [Login to download](https://www.paloaltonetworks.com/login?ts=markdown) * [Join us to become a member](https://www.paloaltonetworks.com/login?screenToRender=traditionalRegistration&ts=markdown) * EN ![black arrow pointing left to go back to main navigation](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/arrow-right-black.svg) Language * [USA (ENGLISH)](https://www.paloaltonetworks.com) * [AUSTRALIA (ENGLISH)](https://www.paloaltonetworks.com.au) * [BRAZIL (PORTUGUÉS)](https://www.paloaltonetworks.com.br) * [CANADA (ENGLISH)](https://www.paloaltonetworks.ca) * [CHINA (简体中文)](https://www.paloaltonetworks.cn) * [FRANCE (FRANÇAIS)](https://www.paloaltonetworks.fr) * [GERMANY (DEUTSCH)](https://www.paloaltonetworks.de) * [INDIA (ENGLISH)](https://www.paloaltonetworks.in) * [ITALY (ITALIANO)](https://www.paloaltonetworks.it) * [JAPAN (日本語)](https://www.paloaltonetworks.jp) * [KOREA (한국어)](https://www.paloaltonetworks.co.kr) * [LATIN AMERICA (ESPAÑOL)](https://www.paloaltonetworks.lat) * [MEXICO (ESPAÑOL)](https://www.paloaltonetworks.com.mx) * [SINGAPORE (ENGLISH)](https://www.paloaltonetworks.sg) * [SPAIN (ESPAÑOL)](https://www.paloaltonetworks.es) * [TAIWAN (繁體中文)](https://www.paloaltonetworks.tw) * [UK (ENGLISH)](https://www.paloaltonetworks.co.uk) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [What's New](https://www.paloaltonetworks.com/resources?ts=markdown) * [Get support](https://support.paloaltonetworks.com/SupportAccount/MyAccount) * [Under Attack?](https://start.paloaltonetworks.com/contact-unit42.html) * [Demos and Trials](https://www.paloaltonetworks.com/get-started?ts=markdown) Search All * [Tech Docs](https://docs.paloaltonetworks.com/search) Close search modal [Deploy Bravely --- Secure your AI transformation with Prisma AIRS](https://www.deploybravely.com) [](https://www.paloaltonetworks.com/?ts=markdown) 1. [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) 2. [Security Operations](https://www.paloaltonetworks.com/cyberpedia/security-operations?ts=markdown) 3. [MITRE Att\&ck](https://www.paloaltonetworks.com/cyberpedia/what-is-mitre-attack?ts=markdown) 4. [How Does MITRE ATT\&CK Apply to Different Technologies?](https://www.paloaltonetworks.com/cyberpedia/mitre-attack-for-different-technologies?ts=markdown) Table of Contents * [What Is MITRE ATT\&CK Framework?](https://www.paloaltonetworks.com/cyberpedia/what-is-mitre-attack?ts=markdown) * [MITRE ATT\&CK Framework Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-mitre-attack#mitre?ts=markdown) * [Structuring Adversary Behavior by Tactic](https://www.paloaltonetworks.com/cyberpedia/what-is-mitre-attack#structuring?ts=markdown) * [MITRE ATT\&CK Tactics and Their Role in Security Intelligence](https://www.paloaltonetworks.com/cyberpedia/what-is-mitre-attack#intelligence?ts=markdown) * [MITRE ATT\&CK Techniques](https://www.paloaltonetworks.com/cyberpedia/what-is-mitre-attack#techniques?ts=markdown) * [MITRE ATT\&CK Use Cases](https://www.paloaltonetworks.com/cyberpedia/what-is-mitre-attack#usecases?ts=markdown) * [Using the MITRE ATT\&CK Framework during a Live Attack](https://www.paloaltonetworks.com/cyberpedia/what-is-mitre-attack#live?ts=markdown) * [Comparing MITRE ATT\&CK and the Cyber Kill Chain](https://www.paloaltonetworks.com/cyberpedia/what-is-mitre-attack#comparing?ts=markdown) * [Advancing Organizational Maturity with ATT\&CK](https://www.paloaltonetworks.com/cyberpedia/what-is-mitre-attack#advancing?ts=markdown) * [Toward a Behavioral Framework for Securing AI](https://www.paloaltonetworks.com/cyberpedia/what-is-mitre-attack#toward?ts=markdown) * [MITRE ATT\&CK Framework FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-mitre-attack#faqs?ts=markdown) * [How Do I Implement MITRE ATT\&CK Techniques?](https://www.paloaltonetworks.com/cyberpedia/how-to-implement-mitre-attack-techniques?ts=markdown) * [Key Elements of the MITRE ATT\&CK Framework](https://www.paloaltonetworks.com/cyberpedia/how-to-implement-mitre-attack-techniques#key-elements?ts=markdown) * [How to Implement MITRE ATT\&CK Techniques](https://www.paloaltonetworks.com/cyberpedia/how-to-implement-mitre-attack-techniques#implement?ts=markdown) * [How to Use MITRE ATT\&CK Techniques Effectively](https://www.paloaltonetworks.com/cyberpedia/how-to-implement-mitre-attack-techniques#how-to-use?ts=markdown) * [MITRE ATT\&CK Techniques Used Often by Cyber Attackers](https://www.paloaltonetworks.com/cyberpedia/how-to-implement-mitre-attack-techniques#techniques?ts=markdown) * [Implementing MITRE ATT\&CK Techniques FAQs](https://www.paloaltonetworks.com/cyberpedia/how-to-implement-mitre-attack-techniques#faq?ts=markdown) * [What is the MITRE ATT\&CK Matrix?](https://www.paloaltonetworks.com/cyberpedia/what-is-mitre-attack-matrix?ts=markdown) * [MITRE ATT\&CK Matrix Explained](https://www.paloaltonetworks.com/cyberpedia/what-is-mitre-attack-matrix#mitre?ts=markdown) * [Key Components of MITRE ATT\&CK: Tactics, Techniques, and Procedures](https://www.paloaltonetworks.com/cyberpedia/what-is-mitre-attack-matrix#key?ts=markdown) * [Diverse MITRE ATT\&CK Matrices: Adapting to Specific Environments](https://www.paloaltonetworks.com/cyberpedia/what-is-mitre-attack-matrix#diverse?ts=markdown) * [How Organizations Operationalize MITRE ATT\&CK](https://www.paloaltonetworks.com/cyberpedia/what-is-mitre-attack-matrix#how?ts=markdown) * [Implementing and Maintaining a MITRE ATT\&CK Program](https://www.paloaltonetworks.com/cyberpedia/what-is-mitre-attack-matrix#program?ts=markdown) * [Benefits of Leveraging the MITRE ATT\&CK Framework](https://www.paloaltonetworks.com/cyberpedia/what-is-mitre-attack-matrix#benefits?ts=markdown) * [Common Challenges and Solutions](https://www.paloaltonetworks.com/cyberpedia/what-is-mitre-attack-matrix#solutions?ts=markdown) * [MITRE ATT\&CK and the Cybersecurity Landscape](https://www.paloaltonetworks.com/cyberpedia/what-is-mitre-attack-matrix#landscape?ts=markdown) * [MITRE ATT\&CK Matrix FAQs](https://www.paloaltonetworks.com/cyberpedia/what-is-mitre-attack-matrix#faqs?ts=markdown) * [What Are MITRE ATT\&CK Techniques?](https://www.paloaltonetworks.com/cyberpedia/what-are-mitre-attack-techniques?ts=markdown) * [MITRE ATT\&CK Techniques Explained](https://www.paloaltonetworks.com/cyberpedia/what-are-mitre-attack-techniques#techniques?ts=markdown) * [The Anatomy of a MITRE ATT\&CK Technique](https://www.paloaltonetworks.com/cyberpedia/what-are-mitre-attack-techniques#anatomy?ts=markdown) * [Understanding Common and Emerging ATT\&CK Techniques](https://www.paloaltonetworks.com/cyberpedia/what-are-mitre-attack-techniques#common-techniques?ts=markdown) * [Detecting and Mitigating MITRE ATT\&CK Techniques](https://www.paloaltonetworks.com/cyberpedia/what-are-mitre-attack-techniques#detecting?ts=markdown) * [Leveraging ATT\&CK Techniques for Enhanced Security Operations](https://www.paloaltonetworks.com/cyberpedia/what-are-mitre-attack-techniques#leveraging?ts=markdown) * [The Future Evolution of ATT\&CK Techniques](https://www.paloaltonetworks.com/cyberpedia/what-are-mitre-attack-techniques#future-evolution?ts=markdown) * [MITRE ATT\&CK Techniques FAQs](https://www.paloaltonetworks.com/cyberpedia/what-are-mitre-attack-techniques#faqs?ts=markdown) * [How Has MITRE ATT\&CK Evolved?](https://www.paloaltonetworks.com/cyberpedia/evolution-of-mitre-attack-continuous-improvement-and-adaptation?ts=markdown) * [Evolution of MITRE ATT\&CK Explained](https://www.paloaltonetworks.com/cyberpedia/evolution-of-mitre-attack-continuous-improvement-and-adaptation#evolution?ts=markdown) * [The Historical Trajectory of MITRE ATT\&CK](https://www.paloaltonetworks.com/cyberpedia/evolution-of-mitre-attack-continuous-improvement-and-adaptation#historical?ts=markdown) * [Why TTPs Matter: Shifting the Cybersecurity Paradigm](https://www.paloaltonetworks.com/cyberpedia/evolution-of-mitre-attack-continuous-improvement-and-adaptation#why?ts=markdown) * [Key Milestones in ATT\&CK's Expansion and Refinement](https://www.paloaltonetworks.com/cyberpedia/evolution-of-mitre-attack-continuous-improvement-and-adaptation#key?ts=markdown) * [Core Components and Their Evolving Definition](https://www.paloaltonetworks.com/cyberpedia/evolution-of-mitre-attack-continuous-improvement-and-adaptation#core?ts=markdown) * [Why the Evolution Matters: Benefits for Cybersecurity Professionals](https://www.paloaltonetworks.com/cyberpedia/evolution-of-mitre-attack-continuous-improvement-and-adaptation#professionals?ts=markdown) * [Addressing the Evolving Threat Landscape with ATT\&CK](https://www.paloaltonetworks.com/cyberpedia/evolution-of-mitre-attack-continuous-improvement-and-adaptation#evolving?ts=markdown) * [Operationalizing the Framework: Practical Applications and Challenges](https://www.paloaltonetworks.com/cyberpedia/evolution-of-mitre-attack-continuous-improvement-and-adaptation#challenges?ts=markdown) * [The Future of MITRE ATT\&CK](https://www.paloaltonetworks.com/cyberpedia/evolution-of-mitre-attack-continuous-improvement-and-adaptation#future?ts=markdown) * [Evolution of MITRE ATT\&CK FAQs](https://www.paloaltonetworks.com/cyberpedia/evolution-of-mitre-attack-continuous-improvement-and-adaptation#faqs?ts=markdown) * [What Are MITRE ATT\&CK Use Cases?](https://www.paloaltonetworks.com/cyberpedia/what-are-mitre-attack-use-cases?ts=markdown) * [How MITRE ATT\&CK Benefits Organizations](https://www.paloaltonetworks.com/cyberpedia/what-are-mitre-attack-use-cases#how?ts=markdown) * [Key Components of the ATT\&CK Matrix](https://www.paloaltonetworks.com/cyberpedia/what-are-mitre-attack-use-cases#key?ts=markdown) * [Main Use Cases for MITRE ATT\&CK](https://www.paloaltonetworks.com/cyberpedia/what-are-mitre-attack-use-cases#main?ts=markdown) * [Real-World Applications of MITRE ATT\&CK](https://www.paloaltonetworks.com/cyberpedia/what-are-mitre-attack-use-cases#real?ts=markdown) * [MITRE Att\&ck Use Cases FAQs](https://www.paloaltonetworks.com/cyberpedia/what-are-mitre-attack-use-cases#faqs?ts=markdown) * [A CISO's Guide to MITRE ATT\&CK](https://www.paloaltonetworks.com/cyberpedia/a-cisos-guide-to-mitre-attack?ts=markdown) * [MITRE ATT\&CK Explained](https://www.paloaltonetworks.com/cyberpedia/a-cisos-guide-to-mitre-attack#mitre?ts=markdown) * [Benefits of MITRE ATT\&CK for CISOs](https://www.paloaltonetworks.com/cyberpedia/a-cisos-guide-to-mitre-attack#benefits?ts=markdown) * [How MITRE ATT\&CK Works for Cybersecurity Leaders](https://www.paloaltonetworks.com/cyberpedia/a-cisos-guide-to-mitre-attack#how?ts=markdown) * [Implementing MITRE ATT\&CK in Your Security Operations](https://www.paloaltonetworks.com/cyberpedia/a-cisos-guide-to-mitre-attack#operations?ts=markdown) * [Challenges and Best Practices for CISOs](https://www.paloaltonetworks.com/cyberpedia/a-cisos-guide-to-mitre-attack#challenges?ts=markdown) * [MITRE ATT\&CK for CISOs FAQs](https://www.paloaltonetworks.com/cyberpedia/a-cisos-guide-to-mitre-attack#faqs?ts=markdown) * How Does MITRE ATT\&CK Apply to Different Technologies? * [Key Elements of the MITRE ATT\&CK Framework](https://www.paloaltonetworks.com/cyberpedia/mitre-attack-for-different-technologies#key?ts=markdown) * [Technological Domains of the MITRE ATT\&CK Framework](https://www.paloaltonetworks.com/cyberpedia/mitre-attack-for-different-technologies#technological?ts=markdown) * [MITRE ATT\&CK for Different Technologies FAQs](https://www.paloaltonetworks.com/cyberpedia/mitre-attack-for-different-technologies#faqs?ts=markdown) * [What is the Difference Between MITRE ATT\&CK Sub-Techniques and Procedures?](https://www.paloaltonetworks.com/cyberpedia/mitre-attack-sub-techniques-vs-procedures?ts=markdown) * [Understanding the MITRE ATT\&CK Framework](https://www.paloaltonetworks.com/cyberpedia/mitre-attack-sub-techniques-vs-procedures#understanding?ts=markdown) * [Exploring Sub-Techniques in the ATT\&CK Framework](https://www.paloaltonetworks.com/cyberpedia/mitre-attack-sub-techniques-vs-procedures#sub-techniques?ts=markdown) * [Exploring Procedures in the ATT\&CK Framework](https://www.paloaltonetworks.com/cyberpedia/mitre-attack-sub-techniques-vs-procedures#procedures?ts=markdown) * [The Role of Sub-Techniques in Cybersecurity Strategies](https://www.paloaltonetworks.com/cyberpedia/mitre-attack-sub-techniques-vs-procedures#role?ts=markdown) * [Procedures as a Tool for Detailed Threat Analysis](https://www.paloaltonetworks.com/cyberpedia/mitre-attack-sub-techniques-vs-procedures#tool?ts=markdown) * [Continuous Evolution: Staying Updated with ATT\&CK Framework](https://www.paloaltonetworks.com/cyberpedia/mitre-attack-sub-techniques-vs-procedures#continuous?ts=markdown) * [MITRE ATT\&CK Sub-Techniques vs. Procedures FAQs](https://www.paloaltonetworks.com/cyberpedia/mitre-attack-sub-techniques-vs-procedures#faqs?ts=markdown) # How Does MITRE ATT\&CK Apply to Different Technologies? 3 min. read Table of Contents * * [Key Elements of the MITRE ATT\&CK Framework](https://www.paloaltonetworks.com/cyberpedia/mitre-attack-for-different-technologies#key?ts=markdown) * [Technological Domains of the MITRE ATT\&CK Framework](https://www.paloaltonetworks.com/cyberpedia/mitre-attack-for-different-technologies#technological?ts=markdown) * [MITRE ATT\&CK for Different Technologies FAQs](https://www.paloaltonetworks.com/cyberpedia/mitre-attack-for-different-technologies#faqs?ts=markdown) 1. Key Elements of the MITRE ATT\&CK Framework * * [Key Elements of the MITRE ATT\&CK Framework](https://www.paloaltonetworks.com/cyberpedia/mitre-attack-for-different-technologies#key?ts=markdown) * [Technological Domains of the MITRE ATT\&CK Framework](https://www.paloaltonetworks.com/cyberpedia/mitre-attack-for-different-technologies#technological?ts=markdown) * [MITRE ATT\&CK for Different Technologies FAQs](https://www.paloaltonetworks.com/cyberpedia/mitre-attack-for-different-technologies#faqs?ts=markdown) The MITRE ATT\&CK framework covers a wide range of technologies and environments, providing security teams with a comprehensive understanding of real-world attackers' tactics and behavior. The MITRE ATT\&CK method has different matrices for various technological areas, helping security teams deal with threats specific to each. These include: * Cloud ATT\&CK for cloud platforms like AWS, Azure, and Google Cloud. * Container ATT\&CK for technologies like Docker and Kubernetes. * Enterprise ATT\&CK for corporate networks. * PRE-ATT\&CK for activities before an attack. * Mobile ATT\&CK for mobile devices. * Standard Application-Layer Protocols * Alarm Systems * Firmware Each matrix in the framework customizes the tactics, techniques, and procedures (TTPs) to the unique characteristics and challenges of the corresponding technology. This customization enables security teams to identify potential attack vectors and strengthen their defenses against threats targeting various technological domains. ## Key Elements of the MITRE ATT\&CK Framework The MITRE ATT\&CK framework helps security teams communicate better by providing a complete taxonomy of cyberattackers' complex and adaptable strategies and methods. This knowledge base helps improve detection, analysis, and mitigation strategies by documenting how threat actors attack businesses and giving them the know-how to defend themselves. Mapping adversarial behavior to the framework's TTPs is crucial for understanding and responding to cyberthreats. Each classification contains a variety of techniques explaining how attackers accomplish their malicious goals. This comprehensive database is constantly evolving and categorizes the actions and behaviors of cyber attackers into three main areas: * Tactics provide a high-level view of an attacker's intentions and help cybersecurity professionals understand the purpose behind various cyberattacks. * Techniques provide a more detailed understanding of attackers' actions during a cyber operation. * Procedures delve deeper, revealing how opponents maneuver in specific scenarios by providing details on implementing certain techniques. ### MITRE ATT\&CK Tactics MITRE ATT\&CK tactics describe the goals that threat actors aim to achieve during a cyberattack. These strategic objectives provide valuable insights into the possible strategies that potential adversaries might use, including gaining access to credentials, evading defensive measures, executing malicious code, getting initial access to a system, moving laterally across systems, and augmenting their privileges. ### MITRE ATT\&CK Techniques MITRE ATT\&CK techniques refer to attackers' specific methods to accomplish their objectives. For example, under the execution tactic, a command and scripting interpreter technique shows how the attacker uses command-line interfaces or scripting languages to carry out malicious commands. #### What Are Sub-techniques? Sub-techniques describe adversarial behaviors used to achieve a specific goal in a more detailed manner. They provide a lower description level than techniques, allowing for a more comprehensive understanding of how adversaries carry out a technique. Sub-techniques further break down techniques into more specific actions. For instance, an adversary may access the Local Security Authority (LSA) Secrets to dump credentials. ### MITRE ATT\&CK Procedures MITRE ATT\&CK procedures refer to an adversary's specific tactics to carry out a particular technique or sub-technique. These procedures can take various forms, such as using PowerShell to inject malicious code into lsass.exe to extract the victim's credentials by scraping LSASS memory. The procedures are classified and cataloged in ATT\&CK as examples of techniques observed in the wild and can be located in the "Procedure Examples" section of the technique pages. ### How Are Sub-techniques and Procedures Different? Sub-techniques and procedures are two distinct elements in the ATT\&CK framework. Sub-techniques categorize behavior, and procedures describe in-the-wild techniques. Since procedures are specific implementations of techniques and sub-techniques, they may include several additional behaviors in how they are performed. For example, an adversary using PowerShell to inject into lsass.exe to dump credentials by scraping LSASS memory on a victim is a procedure implementation containing several (sub)techniques covering the PowerShell, Process Injection, and Credential Dumping against LSASS behaviors. ## Technological Domains of the MITRE ATT\&CK Framework The MITRE ATT\&CK framework's matrices specialize in different technology areas. Each matrix addresses specific cyberthreats relevant to distinct technological environments, ranging from cloud platforms to mobile devices. This approach allows cybersecurity teams to effectively focus on and counteract threats unique to each technological domain, utilizing the detailed tactics and techniques outlined in the respective matrices. ### Cloud Security Threats The MITRE ATT\&CK [Cloud Matrix](https://attack.mitre.org/matrices/enterprise/cloud/) is structured to identify and mitigate vulnerabilities specific to cloud platforms like AWS, Azure, and Google Cloud. This framework catalogs cloud-specific techniques adversaries use, such as exploiting misconfigurations, compromising cloud management consoles, or taking advantage of weak identity and access management controls. ### ATT\&CK Strategies in Containerized Environments MITRE ATT\&CK [Containers Matrix](https://attack.mitre.org/matrices/enterprise/containers/) describes attack strategies specifically designed to target containerized environments, such as those using Docker and Kubernetes. Common strategies include exploitation of configuration weaknesses, attacks on container orchestration tools, persistence tactics, deploying malicious containers, and lateral movement techniques. ### Enterprise Network Security The MITRE ATT\&CK framework offers a comprehensive view of cyberattackers' strategies and methods in enterprise network environments. It encompasses tactics like initial access, credential access, defense evasion, privilege escalation, and techniques for maintaining a foothold within a network. ### Pre-attack Preparation The MITRE ATT\&CK PRE-ATT\&CK matrix focuses on the initial stages of a cyberattack, including gathering intelligence and preparing the attack through tactics like reconnaissance and weaponization. ### MITRE ATT\&CK and Mobile Device Security The MITRE ATT\&CK framework's matrix for mobile devices addresses security concerns specific to platforms like iOS and Android, outlining tactics and techniques for exploiting vulnerabilities and executing malicious code. ### MITRE ATT\&CK and Standard Application-Layer Protocols MITRE ATT\&CK identifies techniques adversaries use to exploit standard application-layer protocols for malicious purposes, highlighting activities like command and control communications and data exfiltration. ## MITRE ATT\&CK for Different Technologies FAQs ### What is MITRE ATT\&CK? MITRE ATT\&CK is a globally accessible knowledge base categorizing various adversarial tactics and techniques observed in real-world cybersecurity threats. ### Why did MITRE develop ATT\&CK? MITRE developed the ATT\&CK framework to enhance the cybersecurity community's ability to detect, prevent, and respond to cyberthreats. ### What are tactics in the MITRE ATT\&CK framework? Tactics in MITRE ATT\&CK refer to the objectives or goals adversaries aim to achieve in their cyber operations. ### What are the techniques and sub-techniques defined in the MITRE ATT\&CK? Techniques in MITRE ATT\&CK describe adversaries' specific methods or actions to accomplish their tactical objectives. Sub-techniques are a more specific description of the adversarial behavior used to achieve a goal. They describe behavior at a lower level than a technique. For example, an adversary may dump credentials by accessing the Local Security Authority (LSA) Secrets. ### How is D3FEND related to MITRE ATT\&CK? D3FEND is a complementary framework to MITRE ATT\&CK, focusing on cybersecurity countermeasure techniques to mitigate or prevent adversarial actions. Related Content [What is the MITRE ATT\&CK? MITRE ATT\&CK is a cornerstone framework that comprehensively understands cyber adversary tactics and techniques.](https://www.paloaltonetworks.com/cyberpedia/what-is-mitre-attack) [Cortex and the MITRE ATT\&CK Evaluations See how Cortex XDR performed in the MITRE ATT\&CK evaluations](https://www.paloaltonetworks.com/cortex/cortex-xdr/mitre) [MITRE Engenuity ATT\&CK Dashboard Explore all of the MITRE Engenuity ATT\&CK results](https://app.powerbi.com/view?r=eyJrIjoiNWRhYzY1YjItOTAxZC00MGM5LThlNzYtOTYxNzViYzM1ZGY2IiwidCI6IjgyOTNjZmRmLThjMjQtNDY1NS1hMzA3LWVhMjFjZDNiMjJmZiIsImMiOjF9) [The Essential Guide to the 2023 MITRE Engenuity ATT\&CK Evaluation Investing in XDR today can protect you against tomorrow's threats. Read our guide to learn more about its applications and use cases.](https://start.paloaltonetworks.com/essential-guide-MITRE-R5) ![Share page on facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/facebook-circular-icon.svg) ![Share page on linkedin](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/linkedin-circular-icon.svg) [![Share page by an email](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/resources/email-circular-icon.svg)](mailto:?subject=How%20Does%20MITRE%20ATT%26CK%20Apply%20to%20Different%20Technologies%3F&body=Explore%20how%20MITRE%20ATT%26CK%20applies%20to%20different%20technologies%20to%20learn%20how%20it%20fortifies%20cybersecurity%20across%20enterprise%2C%20mobile%2C%20cloud%2C%20and%20containers.%20at%20https%3A//www.paloaltonetworks.com/cyberpedia/mitre-attack-for-different-technologies) Back to Top [Previous](https://www.paloaltonetworks.com/cyberpedia/a-cisos-guide-to-mitre-attack?ts=markdown) A CISO's Guide to MITRE ATT\&CK [Next](https://www.paloaltonetworks.com/cyberpedia/mitre-attack-sub-techniques-vs-procedures?ts=markdown) What is the Difference Between MITRE ATT\&CK Sub-Techniques and Procedures? {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language