MITRE D3FEND
MITRE D3FEND is the counterpart to ATT&CK from a defender’s perspective: a structured knowledge model for defensive cybersecurity techniques such as hardening, detection, isolation, and deception—with direct mappings to ATT&CK attack techniques.;
MITRE D3FEND (Detection, Denial, and Disruption Framework Empowering Network Defense) is an NSA-sponsored knowledge model that systematically catalogs defensive cybersecurity techniques—similar to how MITRE ATT&CK catalogs attack techniques.
D3FEND vs. ATT&CK: Complementary Frameworks
While ATT&CK documents how attackers operate (TTPs), D3FEND documents how defenders can respond:
- MITRE ATT&CK: Attacker perspective—tactics, techniques, sub-techniques
- MITRE D3FEND: Defender’s perspective – defensive techniques effective against ATT&CK techniques;
The core promise: For every ATT&CK technique, there is one or more countermeasures in D3FEND with explicit mapping.
D3FEND Defensive Tactics
-
HARDEN - Reduce the attack surface before an attack occurs
- Application Hardening (Removing Unused Components)
- Credential Hardening (Multi-factor Authentication)
- Message Hardening (Email Header Analysis)
- Network Traffic Filtering (Inbound Session Volume Analysis)
-
DETECT (Detection) - Detect attacks in real time before they cause damage
- File Analysis (Dynamic Analysis, Emulation)
- Network Traffic Analysis (Protocol Anomaly Detection)
- Platform Monitoring (System Call Analysis)
- User Behavior Analysis (Authentication Event Thresholding)
-
ISOLATE (Isolation) - Mitigate damage by isolating compromised systems
- Network Isolation (Broadcast Domain Isolation)
- Execution Isolation (Sandbox)
- Credential Isolation (Certificate-based Authentication)
-
DECEIVE (Deception) - Mislead and stop attackers
- Decoy Environment (Honeypot, Honeynet)
- Decoy Content (Honey Credentials, Canary Tokens)
- Decoy System (Decoy Network Resource)
-
EVICT (Removal) - Remove attackers from the system after they have penetrated it
- Credential Eviction (Account Locking)
- Process Eviction (Process Termination)
- Execution Eviction (Driver Load Integrity Checking)
D3FEND in Practice: Gap Analysis
D3FEND enables a structured gap analysis of your own defense capabilities:
Example: ATT&CK; T1566.001 (Spearphishing Attachment) → D3FEND Countermeasures:
- M1049: Antivirus/Antimalware (DETECT: File Analysis)
- M1031: Email Content Filtering (HARDEN: Message Filtering)
- M1017: User Training (HARDEN: User Education)
- M1021: Restrict Web-Based Content (ISOLATE: Web Content Filtering)
- D3-DAM: Dynamic Analysis → Sandbox analysis of attachments
Questions for the gap analysis:
- Do we have email attachment sandboxing? (DETECT)
- Do we have DKIM/DMARC/SPF for outgoing emails? (HARDEN)
- Do we have user awareness training? (HARDEN)
- Do we have EDR with behavioral detection? (DETECT + EVICT)
D3FEND Ontology
An important feature of D3FEND is its machine-readable ontology (OWL/RDF format)—it enables automation:
- Automatic mapping: Which controls cover which ATT&CK techniques?
- Coverage reports: How many techniques are covered vs. blind spots?
- Tool integration: SIEM vendors can tag their rules directly with D3FEND
D3FEND is freely available at with an interactive knowledge graph, technique search, and ATT&CK mapping tool.;