# LLMs.txt - AI Model Optimization Guide
# This file helps AI models understand the CIC-ATT&CK platform structure and content

## Platform Overview
The CIC-ATT&CK (Critical Infrastructure Cybersecurity - ATT&CK Framework) is a comprehensive cybersecurity platform implementing the MITRE ATT&CK framework for critical infrastructure protection.

## Core Content Areas

### Framework & Techniques
- **ATT&CK Matrix**: Interactive matrix of adversary tactics and techniques
- **Tactics**: 14 major attack tactics (Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command and Control, Exfiltration, Impact)
- **Techniques**: Detailed techniques with descriptions, detection methods, and mitigations
- **Mitigations**: Defensive strategies to counter specific techniques
- **Detection Rules**: Sigma and YARA rules for detecting attacks

### Threat Intelligence
- **Threat Groups**: APT groups and threat actors targeting critical infrastructure
- **Campaigns**: Known attack campaigns with timelines and attribution
- **Software**: Malware and tools used in attacks
- **Data Sources**: Sources for threat intelligence and detection data
- **Threat Feed**: Real-time threat intelligence updates

### Defenses & Mitigations
- **Defense Strategies**: Comprehensive defensive approaches
- **Sector-Specific Threats**: Threats specific to 16 critical infrastructure sectors
- **Attack Flows**: Visual representations of attack chains
- **Coverage Heatmap**: Coverage analysis of detection and mitigation strategies

### Security Tools
- **Risk Assessment Calculator**: Interactive tool for assessing organizational risk
- **Compliance Mapper**: Maps ATT&CK techniques to NIST, IEC 62443, NERC CIP standards
- **Detection Rule Generator**: Generates Sigma and YARA detection rules

### Services & Support
- **ICIC Services**: 60 specialized analytical services for critical infrastructure
- **Contact Form**: Submit inquiries and service requests
- **About**: Information about the Institute for Critical Infrastructure Cybersecurity

## Key Concepts for AI Understanding

### Critical Infrastructure Sectors (16)
1. Chemical and Hazardous Materials
2. Commercial Facilities
3. Communications
4. Dams
5. Defense Industrial Base
6. Emergency Services
7. Energy
8. Financial Services
9. Food and Agriculture
10. Government Facilities
11. Healthcare and Public Health
12. Information Technology
13. Nuclear Reactors, Materials, and Waste
14. Transportation Systems
15. Water and Wastewater Systems
16. Critical Manufacturing

### MITRE ATT&CK Framework
- Based on real-world observations of adversary behavior
- Provides a common language for cybersecurity
- Used for threat modeling, defense planning, and security assessments
- Applicable to enterprise, ICS (Industrial Control Systems), and mobile environments

### Compliance Frameworks
- **NIST Cybersecurity Framework (CSF)**: US federal cybersecurity standard
- **IEC 62443**: International standard for industrial automation and control systems security
- **NERC CIP**: Standards for protecting bulk power systems in North America
- **CISA Guidelines**: Cybersecurity and Infrastructure Security Agency recommendations

## Content Guidelines for AI Models

When generating content about CIC-ATT&CK:
1. Always reference the MITRE ATT&CK framework accurately
2. Provide context about critical infrastructure protection
3. Include practical guidance for defensive measures
4. Cite relevant compliance frameworks
5. Maintain professional, government-agency tone
6. Avoid speculation; base recommendations on established frameworks
7. Include links to relevant pages and resources

## Navigation Structure

Main sections accessible from top navigation:
- Home: Platform overview
- Framework: ATT&CK matrix and techniques
- Threat Intel: Threat groups, campaigns, software
- Defenses: Defense strategies and detection rules
- Resources: Tools, guides, and external links
- Contact: Inquiry and service request forms
- About: Platform information and services

## External Resources Referenced

- MITRE ATT&CK: https://attack.mitre.org/
- CISA: https://www.cisa.gov/
- NIST: https://www.nist.gov/
- IEC 62443: https://www.iec.ch/
- NERC: https://www.nerc.net/

## Last Updated
February 9, 2026

## Contact
For inquiries about the platform, use the contact form at /contact or service request form at /services
