MITRE ATLAS Reference
101 techniques, 69 sub-techniques across 16 tactics
MITRE ATLAS is the adversarial-AI counterpart to ATT&CK: a public, evolving taxonomy of techniques used to attack AI systems, from poisoning training data to extracting models to bypassing prompt-injection defenses. Each tactic below groups techniques used to accomplish a specific adversarial goal against an AI system. Every page links to MITRE's authoritative source and includes practitioner context from GTK Cyber's AI security training.
Tactics
Reconnaissance 8 techniques
AML.TA0002
Resource Development 13 techniques
AML.TA0003
Initial Access 7 techniques
AML.TA0004
AI Model Access 4 techniques
AML.TA0000
Execution 6 techniques
AML.TA0005
Persistence 9 techniques
AML.TA0006
Privilege Escalation 4 techniques
AML.TA0012
Defense Evasion 15 techniques
AML.TA0007
Credential Access 6 techniques
AML.TA0013
Discovery 9 techniques
AML.TA0008
Lateral Movement 2 techniques
AML.TA0015
Collection 4 techniques
AML.TA0009
AI Attack Staging 6 techniques
AML.TA0001
Command and Control 3 techniques
AML.TA0014
Exfiltration 6 techniques
AML.TA0010
Impact 9 techniques
AML.TA0011
Looking for the broader ATT&CK framework?
See the MITRE ATT&CK reference for the full enterprise adversary taxonomy (697 techniques across 14 tactics).
AI red teaming, taught by people who do it.
GTK Cyber's hands-on AI security courses cover the ATLAS framework end-to-end.
View AI Security Courses