A common approach allows for a collective response to cybersecurity threats.

Standards make daily life go a lot more smoothly. When you plug in a power cord in the U.S., you can count on the plug and socket to match, regardless of manufacturer or location. If you need gas in your car, you know the nozzle will fit your tank.

Towards a similar end, MITRE works with industry and government on common approaches to cybersecurity.

Our focus is to develop and expand the use of common terminology and structures to allow for collaboration and communication across the entire community. These efforts include providing registries of baseline security data, establishing standardized languages for accurately communicating cybersecurity information, defining proper use of cybersecurity concepts, and supporting community approaches for commonly accepted cybersecurity processes. We describe several of them here.

The CVE® List

The Common Vulnerabilities and Exposures (CVE®) list was one of MITRE’s earliest attempts to systematically name security vulnerabilities.

Recognized as the standard for naming vulnerabilities, CVE enables correlation among security products, services, and organizations. Well over 100 products and services from more than 75 vendors have achieved CVE compatibility.

Under Department of Homeland Security sponsorship and in collaboration with the CVE Editorial Board, MITRE works as the independent third party to advance CVE, maintain the CVE list, and ensure CVE serves the public interest.


MITRE is working on two new initiatives for sharing cyber threat information: the Trusted Automated eXchange of Indicator Information (TAXII™) and the Structured Threat Information eXpression (STIX™), both sponsored by the Department of Homeland Security.

TAXII defines a set of protocols for securely exchanging cyber threat information for real-time detection, prevention, and mitigation of cyber threats. STIX provides a common format for cyber threat information, including cyber observables, indicators of compromise, incidents, TTPs (techniques, tactics, and procedures), and campaigns.

Together, TAXII and STIX will enable threat-sharing communities to exchange actionable, structured threat intelligence to promote collective defense.

We also collaborate in similar community efforts for vulnerability management, software assurance, application security, asset management, enterprise reporting, malware protection, configuration management, event management, remediation, and threat information sharing.

In addition to CVE, these efforts include:

Cybersecurity Registries

Cybersecurity Languages/Formats & Protocols

Learn more by visiting MITRE’s Making Security Measurable website.