Search attack techniques

Returns a list of the top attack techniques in your organization that match the specified search criteria. The response includes detailed information about each technique, such as MITRE ATT&CK framework details, mitigations, and metadata.

This endpoint supports advanced search capabilities, including filtering, sorting, and pagination.

For more information, see Top Attack Techniques in the Exposure Management User Guide.

Requires the Basic [16] user role or the ATTACK_PATH_ANALYSIS.QUERY.SEARCH custom role privilege. See Roles and Permissions.

Language
Credentials
Header
Click Try It! to start a request and see the response here!