40-question instrument · PDF + scoring sheet
Score your defenses against the 2026 MITRE ATT&CK matrix in two hours, not two weeks.
The expanded 2026 edition of our MITRE ATT&CK maturity instrument. 40 questions across all 14 Enterprise tactics, with identity-tier and cloud-tier sub-techniques from the 2025 and 2026 matrix updates, four-tier scoring, and a board-ready summary template you can paste into a cyber insurance application unchanged.
Why we rebuilt the worksheet for 2026
The original MITRE ATT&CK Maturity Worksheet was built around the 2023 Enterprise matrix and has been completed by hundreds of small and mid-market IT teams. The framework holds up — but the matrix has moved. The 2025 update added 14 new sub-techniques in the identity tactic alone, and the 2026 update materially expanded the cloud and container coverage that most SMBs were under-mapping. v2 is the rebuild for those updates, plus a couple of changes we wanted to make based on field feedback from teams who completed v1.
The biggest substantive change is in identity coverage. Token theft, MFA bypass, OAuth abuse, and refresh-token chaining are now standard attacker workflow for the ransomware groups that target the 25-to-500-employee range, and v1 was light on the detection coverage for that class of activity. v2 adds an explicit identity scoring lane that runs alongside the endpoint and network lanes from the original. The framework still rolls up to the four-tier label (Reactive, Developing, Defended, Proactive) so year-over-year comparison stays meaningful.
Inside the 40-question instrument
- Section 1 — Reconnaissance and resource development. 4 questions covering external attack surface monitoring, leaked credential detection, and the early-warning signals most teams under-instrument.
- Section 2 — Initial access. 5 questions covering phishing, valid accounts, exploit-of-public-application, and the supply chain compromise surface.
- Section 3 — Execution. 3 questions covering command-line and scripting detection, container execution, and the cloud workload execution patterns from the 2026 matrix.
- Section 4 — Identity and credential access. 6 questions covering token theft, MFA bypass, OAuth abuse, password spraying, and the identity-tier expansion from the 2025 matrix.
- Section 5 — Cloud and container. 5 questions covering cloud account compromise, container escape, cloud storage exfiltration, and the cloud-tier sub-techniques from the 2026 matrix.
- Section 6 — Defense evasion and persistence. 5 questions covering process injection, scheduled task abuse, registry persistence, and the living-off-the-land patterns common in the ransomware actor playbook.
- Section 7 — Discovery, lateral movement, and collection. 6 questions covering network share enumeration, remote service abuse, account discovery, and the data staging patterns that precede most exfiltration events.
- Section 8 — Exfiltration, impact, and the board-ready summary template. 6 questions plus a one-paragraph summary template you can paste into a customer security questionnaire or cyber insurance application unchanged.
- Section 9 — Scoring rubric and 30-60-90 remediation plan template. Maps your scored results to the four tiers and produces a stack-ranked remediation plan for the next 90 days.
Who this is for
The instrument is built for IT managers, heads of IT, solo security leads, and fractional or virtual CISOs at companies in the 25-to-500-employee range. It is especially useful when an auditor, a customer security questionnaire, or a cyber insurance underwriter has asked where you sit on the MITRE ATT&CK framework and you do not have a documented answer.
It is also useful as a structured artifact for penetration testing scoping conversations — the self-assessment helps you and the testing team agree on which tactics deserve focused attack-side validation. Many of our web application pentest and network pentest engagements begin with a v2 review on the kickoff call.
What you will learn
You will leave with a coverage percentage for each of the 14 ATT&CK Enterprise tactics, a four-tier maturity label, a stack-ranked list of the highest-impact controls to close your largest gaps, and a one-paragraph board-and-auditor summary you can paste into a customer security questionnaire response, a SOC 2 readiness review, or a cyber insurance application. The summary template is deliberately written to read as honest rather than aspirational — auditors and underwriters catch aspirational summaries quickly and the failure mode is worse than the disclosure.
On the operational side, you will have a 30-60-90 remediation plan template that you can fill in with your top three gaps. The plan is structured so that the 30-day items are achievable with no budget, the 60-day items assume modest tooling spend, and the 90-day items capture the budget-cycle conversation you will need to have with finance to fix the structural gaps. We have seen this format survive the transition between two IT directors at one company and still produce action.
Pair this with our Web App Pentest Checklist if you are coordinating a paid pentest engagement alongside the self-assessment.
How this connects to our work
Every MITRE ATT&CK assessment engagement starts with a v2 review on the kickoff call. The instrument gives both sides a shared vocabulary so the engagement scope is honest about which tactics deserve deep external validation and which the internal team is already covering well. If the v2 review surfaces gaps in identity or cloud coverage, the Active Directory pentest or a focused cloud assessment is typically the right next step.
We also use v2 to scope full penetration testing engagements that pair external attack-side validation with documented internal self-assessment, which is what most cyber insurance underwriters and SOC 2 auditors are actually looking for. Read our pricing or book a call to scope. For a sense of how we operate, see our about page.
Frequently asked questions
How is v2 different from the original MITRE ATT&CK worksheet?
v2 has 40 questions instead of 24, covers identity-tier and cloud-tier sub-techniques from the 2025 and 2026 ATT&CK matrix updates, and adds an explicit 30-60-90 remediation plan template. The four-tier scoring is unchanged so year-over-year comparison still works.
Do I need to be a security expert to complete it?
No. Each question is plain-English yes/no/partial. A solo IT manager or vCISO can complete the full 40-question instrument in about 2 hours. The scoring rubric automatically rolls answers up to a tier label.
Can I use this for a cyber insurance application or customer questionnaire?
Yes. The board-and-auditor summary template in Section 8 maps directly to questions on most cyber insurance applications and SOC 2 readiness reviews.
Does it cover cloud and identity threats?
Yes. Sections 4 and 5 cover identity-tier sub-techniques (token theft, MFA bypass, OAuth abuse) and cloud-tier sub-techniques (cloud account compromise, container escape, cloud storage exfiltration) from the 2025 and 2026 matrix updates.
What happens after I download?
You get the PDF immediately and one short follow-up email. If you want a remediation working session or an external validation pass against your scored assessment, book a 20-minute scoping call.
Related resources & reading
MITRE ATT&CK Worksheet (v1)
The original 24-question worksheet — still useful for the 2023 matrix baseline.
Web App Pentest Checklist
Pair v2 with a scoped pentest engagement for the externally-validated layer.
MITRE ATT&CK Assessment Service
When the self-assessment needs external validation and a formal report.
Penetration Testing
Attack-side validation that pairs naturally with the self-assessment artifact.
Done with the self-assessment? Let us run external validation.
A completed self-assessment is the right artifact for an internal IT conversation. For a cyber insurance application, a SOC 2 readiness review, or a customer security questionnaire where attestation matters, an external validation pass is typically worth the spend. See our pricing or book a call.