Self-assessment worksheet · 14 tactics · 90-minute review
Score your defenses across all 14 MITRE ATT&CK tactics without hiring a SOC.
A self-assessment worksheet for IT leads, vCISOs, and security generalists who need to give a real answer the next time an auditor, customer security questionnaire, or cyber-insurance underwriter asks where your organization sits on the MITRE ATT&CK framework — with scoring, quick wins, and a board-and-auditor-ready summary template.
Why ATT&CK is now a question SMBs cannot duck
Five years ago, MITRE ATT&CK was an esoteric framework used by red teams and threat-intel analysts at large enterprises. Today, it is the lingua franca of cyber insurance underwriters, SOC 2 auditors, and the security questionnaires that enterprise customers send to their SMB suppliers. If a customer asks where you sit on ATT&CK and your honest answer is "we have not looked at that," you have already lost a percentage of the deal. The worksheet is the smallest amount of work that turns that answer into a defensible one.
It is the same self-assessment our cybersecurity practice runs through with a prospect before scoping a full MITRE ATT&CK assessment or a pentest engagement. The point of the worksheet is to do this calibration in 90 minutes instead of a $30K-plus engagement — and to surface the controls worth investing in before you decide whether a full engagement is actually worth it.
Inside the worksheet
- Section 1 — Why ATT&CK matters for SMBs now. The three new pressure points (cyber insurance underwriters, SOC 2 auditors, enterprise procurement questionnaires) that have made ATT&CK posture a non-optional conversation for sub-500-employee companies.
- Section 2 — Plain-English quick reference for all 14 ATT&CK Enterprise tactics. Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command and Control, Exfiltration, and Impact — each in two to three sentences.
- Section 3 — The self-assessment proper. Three to five yes/no questions per tactic, written so a non-security generalist can answer them honestly. Sample question for Initial Access: 'Do you have MFA enforced on all external-facing services?'
- Section 4 — The scoring sheet. Roll up each tactic to its coverage percentage and your organization to one of four maturity tiers: Reactive, Developing, Defended, or Proactive.
- Section 5 — Top five quick wins for SMBs. The five highest-impact, lowest-cost controls that move most SMBs up two maturity tiers in a single quarter — typically MFA enforcement, EDR rollout, email DMARC, lateral-movement detection via Sysmon, and offsite immutable backups.
- Section 6 — When to bring in a pro. A simple decision rule: if your coverage in Credential Access, Lateral Movement, or Exfiltration is below 40%, get a pentest. If you are above 60% overall, consider a red-team or purple-team to validate. If you are below 30%, prioritize controls over testing.
- Section 7 — Sharing your score with stakeholders. The one-paragraph summary template for board reports, the audit-evidence package for SOC 2, and the customer-questionnaire response phrasing that translates 'maturity tier' into procurement-friendly language.
Who this is for
The worksheet is built for three roles. First, IT managers and heads of IT at 25-to-500-employee companies with no dedicated SOC and possibly an MSSP relationship. They are the ones who get the customer security questionnaire forwarded to them and need a defensible response by Friday. Second, solo security leads and vCISOs who run multiple companies and need a consistent framework for documenting maturity across clients. Third, founders and COOs of regulated startups (fintech, healthtech, SaaS handling PII) who need to give their first SOC 2 auditor or cyber-insurance underwriter a real answer.
If you have a full security team and an established threat-intel function, this worksheet is too basic — we run a more involved internal assessment in our MITRE ATT&CK assessment service. If you are pre-revenue with no customer security pressure yet, the worksheet is premature — focus on the controls covered in Section 5 (MFA, EDR, DMARC, backups) rather than completing the full scoring.
What you will learn
You will learn what each of the 14 ATT&CK Enterprise tactics actually means in plain English, and which of them your organization has any visibility into. You will learn the five highest-leverage controls for SMBs — and why the standard recommendation order (firewall first, EDR later) is actually backwards for most modern threat profiles. You will learn the maturity-tier framework your cyber-insurance underwriter and SOC 2 auditor are now using internally, and how to communicate your position in their language.
You will leave with three concrete artifacts. A scored worksheet you can drop into a board deck. A one-paragraph maturity summary you can paste into a customer security questionnaire. A stack-ranked list of the next three controls worth investing in this quarter. If you are above 60% overall coverage, you will also know whether it is time to validate your defenses with a pentest or whether continuing to invest in controls is the higher-leverage move.
You will also learn how ATT&CK posture connects to other security programs you may be running — SOC 2, ISO 27001, HIPAA, PCI DSS, NIST CSF. Section 7 includes a mapping cheat sheet that shows how each ATT&CK tactic correlates with the controls in those frameworks, which makes the worksheet useful as a cross-framework gap analysis rather than just a standalone exercise.
How this connects to our work
The worksheet is the qualifying conversation we run with prospects before scoping a full MITRE ATT&CK assessment or a multi-vector penetration testing engagement. When the worksheet output shows below-40% coverage in any Credential-Access, Lateral-Movement, or Exfiltration row, the next conversation is usually about scoping a web application pentest, a network pentest, or an Active Directory pentest to validate the gap and produce a remediation roadmap.
The worksheet pairs well with the Web App Pentest Checklist if you are scoping the testing side of your security program. For pricing and engagement model, see the pricing page or read about the QUANT LAB security practice. Recent cybersecurity engagements are summarized at the work page.
Frequently asked questions
Who is the MITRE ATT&CK Maturity Worksheet for?
IT managers, heads of IT, solo security leads, vCISOs, and small-to-mid-market security teams at companies with 25 to 500 employees. Especially useful when an auditor or customer security questionnaire has asked where you sit on ATT&CK.
Do I need to be a security expert to use this worksheet?
No. Each of the 14 ATT&CK tactics is broken into three-to-five yes/no questions written for a generalist IT lead. A solo IT manager can complete the entire worksheet in about 90 minutes.
What does the worksheet actually output?
A coverage percentage for each of the 14 ATT&CK tactics, an overall maturity tier (Reactive, Developing, Defended, or Proactive), a stack-ranked list of the highest-impact controls to close your largest gaps, and a one-paragraph board-and-auditor summary you can paste directly into a customer security questionnaire response or board report.
Is this aligned with the current MITRE ATT&CK framework?
Yes. The worksheet aligns to the 14 Enterprise tactics in the current MITRE ATT&CK matrix. We update the worksheet whenever MITRE publishes a material change.
What if my score comes back low?
Section 5 stack-ranks the top five highest-leverage controls SMBs can deploy in the current quarter to move their score up two tiers. Section 6 covers when it is worth bringing in a pentest or red-team to validate rather than continuing to invest in controls blindly.
Related resources & reading
Web App Pentest Checklist
For when your worksheet score is ready to be validated.
MITRE ATT&CK Assessment
The full version of this self-assessment, scoped to your org.
Penetration Testing
When you are ready to validate your gaps with a real test.
Network Pentest
Network-layer testing to validate the Lateral Movement tactic.
Want a second set of eyes on your worksheet score?
Reply to the confirmation email with your scored worksheet and we will run a 30-minute review pass on it — free. Or book a 20-minute scoping call to discuss whether a pentest, an ATT&CK assessment, or continued control investment is the right next step. See pricing for engagement ranges.