Skip to main content

MITRE ATLAS Navigator

The MITRE ATLAS Navigator works exactly like the ATT&CK Navigator, but it's specifically designed for assessing AI and machine learning systems.

ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) is a knowledge base of adversary tactics and techniques targeting AI/ML — think of it as MITRE ATT&CK, but for AI models, training pipelines, and inference systems.


RTF Login Screen

When to Use the ATLAS Navigator

Use the ATLAS Navigator when your engagement includes:

  • AI/ML model endpoints (APIs, inference services)
  • Model training pipelines
  • Data poisoning scenarios
  • AI-powered products or chatbots
  • LLM-based systems (prompt injection, jailbreaking)
  • Computer vision or NLP systems

If your target doesn't involve AI/ML, you can focus entirely on the ATT&CK Navigator and skip ATLAS.


How It Works

The ATLAS Navigator is identical in structure and behavior to the ATT&CK Navigator:

FeatureATT&CK NavigatorATLAS Navigator
Technique trackingYesYes
In Scope markingYesYes
Status updatesYesYes
Auto-sync with findingsYesYes
AI attack plan generationYesYes (separate plan)
Timeline viewYesYes
Top tactics coverageYesYes

The only difference is the technique library — ATLAS techniques cover AI-specific attack scenarios.


ATLAS Tactic Categories

ATLAS techniques are organized into phases that mirror a typical attack against an AI system:

TacticDescription
ReconnaissanceGathering information about the AI system
Resource DevelopmentAcquiring datasets, models, or infrastructure
ML Attack StagingPreparing adversarial inputs or poisoned data
Initial AccessGaining access to the AI system
ML Model AccessQuerying or accessing model functionality
ExecutionRunning adversarial inputs against the model
PersistenceMaintaining access to the AI system
Defense EvasionAvoiding detection by AI-based defenses
ExfiltrationStealing model parameters or training data
ImpactDegrading model performance or manipulating outputs

Using the ATLAS Navigator

The workflow is the same as the ATT&CK Navigator:

  1. Define scope — use AI Scope Suggestions to mark relevant techniques
  2. Generate a plan — use AI Attack Planning to get an ATLAS-specific plan
  3. Track progress — mark techniques as in-progress or completed
  4. Record findings — findings auto-sync status back to the navigator

Generating an ATLAS Attack Plan

RTF can generate a separate AI attack plan specifically for your ATLAS engagement:

  1. Go to AI Features → Attack Planning
  2. Select MITRE ATLAS as the attack profile
  3. Describe your AI/ML target
  4. Click Generate Plan

The plan will include ATLAS-specific techniques mapped to your target's AI components.


Running AI/ML Scans

RTF also includes an automated AI/ML Model Scanning feature that actively tests AI systems using ATLAS techniques. This is separate from the navigator but the results can feed into your ATLAS findings.

See AI/ML Model Scanning → for details.


Findings and ATLAS

When you create a finding for an ATLAS technique:

  1. Set Attack Profile to MITRE ATLAS when creating the finding
  2. Select the relevant ATLAS technique path
  3. The finding auto-syncs to the ATLAS Navigator (not the ATT&CK Navigator)

Next Steps