MITRE ATT&CK® has been a game-changer for understanding how adversaries operate, but “Tactics” and “Techniques” only get us so far when you’re trying to write a detection rule, simulate an attack, or validate control coverage.
That’s why we thought the release of Procedures in Tidal Cyber’s Threat-Led Defense Platform is a big deal. It’s the first time anyone has delivered a structured, operationalised library of real-world adversary procedures and it’s built to make Threat-Led Defence actually work at the technical level.
So, as a defender, we've unpicked what we think are the highlights for you.
Every defender knows “TTPs”, Tactics, Techniques, and Procedures, but until now, the “P” has always been the missing link.
It’s impossible to write a rule, build a detection, or simulate an adversary against a whole “Technique.” You need procedure-level insight. That’s exactly what this update from Tidal Cyber delivers: The ability to see and use real-world adversary behaviours in a structured, actionable way.
We’ve all read CTI reports that mention “Procedure Examples”, but they’re usually just one-liners describing a threat actor’s use of a (Sub-)Technique, often missing the technical depth defenders actually need. With nearly 700 techniques and sub-techniques across 14 tactics, scaling real threat intel into usable detail has been next to impossible. The data’s out there buried in thousands of reports, but surfacing and structuring it consistently has never been achieved.
Until now.
Tidal Cyber has built the industry’s first-ever structured Procedures Library, sitting at the heart of their Threat-Led Defense platform.
What makes it valuable is
This means you can now see adversary behaviors the way they actually happen, understand which tools in your stack detect or mitigate them, and identify where your coverage truly stops.
The library was built using clearly-aligned definitions:
“A Procedure is a clearly defined, repeatable set of technical actions that an adversary, or simulated adversary, executes to achieve a specific objective.”
That definition became the foundation for a huge data engineering effort. Tidal’s proprietary AI, developed after its acquisition of Zero-Shot Security, processed over 1,500 technical threat reports, extracting procedure-level data points buried deep within them. This isn’t more threat intel. It’s operationalised threat intel that's structured, linked, and ready to use.
This is about giving defenders precision not more noise. With Procedures integrated directly into Tidal Cyber’s platform, defenders can now:
Threat-Led Defence only works when intelligence is usable. Tidal Cyber’s Procedures close the gap between intel and action. By structuring how adversaries actually execute behaviours and linking that directly to detection logic, visibility needs, and control mapping, it’s now possible to operationalise Threat-Led Defense at scale.
Whether you’re:
you’ll have the procedure-level intelligence you’ve been missing.
This release represents something bigger than a product update, it’s a shift in how the defender community can use threat intel. For years, we’ve been guessing and now we can prove it.
Procedures turn abstract TTP's into defensible actions. They let us measure what really matters, but are we ready for how attackers actually operate?
This is the kind of progress that moves Threat-Led Defence from concept to capability. If you’re ready to close the gap between what you know and what you can do, it’s time to explore what these new Procedures can unlock for your team.
NARC gives you the "how" behind the attack, not just the headline tactics & techniques. NARC centers on procedures, automatically pulling them from unstructured data and reports to provide the fidelity customers need to defend against the threats that matter most.
Built by the Team Behind ATT&CK® Tidal Cyber is powered by the practitioners who helped make MITRE ATT&CK® the industry’s common language for adversary behaviour.
With deep roots in ATT&CK stewardship, evaluation programs, and hands-on threat-informed defense, their team has productised the approach they pioneered, making it practical, scalable, and ready for your day-to-day defense.
Book your discovery call now.
When 'Good' looks THIS GOOD!
(and why you probably don't have it yet).
You can keep blocking yesterday’s hash, or you can start defending against tomorrow’s behaviour.
Share this story
We're a community where IT security buyers can engage on their own terms.
We help you to better understand the security challenges associated with digital business and how to address them, so your company remains safe and secure.