Enterprise SIEMs Miss 79% of MITRE ATT&CK Techniques Used by Adversaries, According to CardinalOps' 5th Annual Report
Largest and Longest Analysis of SIEM Detection Engineering Assembled – Spanning Nearly 2.5 Million Log Sources and 13,000 Unique Detection Rules
Drawing from an expansive dataset of 2.5 million total log sources, over 23,000 distinct log sources, more than 13,000 unique detection rules, and hundreds of production SIEM environments, including Splunk, Microsoft Sentinel, IBM QRadar, CrowdStrike Logscale, and Google SecOps, the report uses the MITRE ATT&CK framework as a benchmark. This year's findings highlight major detection coverage gaps and systemic detection engineering challenges that impact the effectiveness of enterprise SIEMs in detection and responding to adversary activity.
Key Findings:
Using the MITRE ATT&CK framework as a baseline, organizations are generally improving year-over-year in understanding SIEM detection coverage and quality, but plenty of room for improvement remains. Some of the key findings from the 2025 report include:
- Only 21% of MITRE ATT&CK Techniques Are Covered: Despite a two percent increase in coverage from 2024, on average, enterprise SIEMs have detection coverage for just 21% of adversary techniques defined in the MITRE ATT&CK framework – leaving 79% of techniques uncovered and organizations vulnerable to attack.
- 13% of SIEM Rules Are Broken: A significant portion of existing detection rules – 13% on average – are non-functional and will never trigger due to issues like misconfigured data sources and missing log fields. While the data represents a five percent decrease from 2024, the persistence of broken rules in SIEM environments poses a huge risk where active threats can go unnoticed.
- Vast Data Goes Underutilized: SIEMs now process an average of 259 log types and nearly 24,000 unique log sources, providing more than enough telemetry to detect over 90% of MITRE ATT&CK techniques (an increase of three percent from 2024) – but manual, error-prone detection engineering practices continue to limit actual coverage.
- Detection Engineering at Scale Remains Elusive: Despite the scale of available data and detection infrastructure, organizations still struggle to keep pace with evolving threats due to resource constraints and a lack of automation in rule development and validation.
"Five years worth of data tells a stark story: organizations are sitting on a mountain of data but still lack the visibility needed to detect the threats that matter most," said
CardinalOps' annual report continues to be a key resource for SOC leaders, CISOs, and detection engineers seeking to measure and improve the effectiveness of their detection capabilities against real-world adversary behavior. The 2025 report also includes actionable guidance and best practices for achieving sustainable, scalable detection posture management that reduces an organization's exposure to threats.
Download the full report here: https://cardinalops.com/white-papers/2025-state-of-siem-report-download
CardinalOps will also be hosting a 2025 State of Detection Webinar and Workshop titled "Bird's
Sign up for the live webinar and workshop here: https://cardinalops.com/birds-eye-view-2025-state-of-detection-webinar-and-workshop
About CardinalOps
CardinalOps is helping organizations eliminate their exposure risk with AI-powered Threat Exposure Management. CardinalOps is the industry's only platform to integrate both prevention and detection controls to provide unified visibility into exposure risk across multiple domains, facilitating context-driven prioritization, and automated and safe remediation. With unparalleled clarity into risk and exposure – security teams can uncover actionable insights into compensating controls and streamline consistent and efficient remediation workflows to proactively reduce risk and strengthen security posture and detection engineering against the threats that matter most. For more information, visit cardinalops.com.
View original content to download multimedia:https://www.prnewswire.com/news-releases/enterprise-siems-miss-79-of-mitre-attck-techniques-used-by-adversaries-according-to-cardinalops-5th-annual-report-302473779.html
SOURCE CardinalOps
Serious News for Serious Traders! Try StreetInsider.com Premium Free!
You May Also Be Interested In
- GENOMMA LAB INTERNACIONAL ANNOUNCES TWELFTH DIVIDEND PAYMENT
- WISeSat.Space and SEALSQ Launch New Satellite with SpaceX, Enabling the First-Ever DePIN from Space, and Advancing Quantum-Safe Space Communications
- AI-Powered RCM Analytics Tools Take Center Stage as Black Book Names Top Vendors Amid Soaring Financial Pressures
Create E-mail Alert Related Categories
PRNewswire, Press ReleasesSign up for StreetInsider Free!
Receive full access to all new and archived articles, unlimited portfolio tracking, e-mail alerts, custom newswires and RSS feeds - and more!