The Enterprise Matrix includes 14 tactics: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command and Control, Exfiltration, and Impact. These tactics follow the typical progression of a cyber attack, from initial information gathering to achieving the final objectives. Each tactic represents a distinct phase where adversaries must achieve specific goals to advance their campaign. Understanding this progression allows security teams to implement defensive measures at each stage, potentially breaking the attack chain before adversaries can achieve their ultimate objectives. The framework also maps specific threat actors to the techniques they commonly employ, enabling targeted threat intelligence.