# Creating a Technique

Cyber attackers or threat actors use specific methods, tactics, and procedures known as techniques to compromise computer systems, gain unauthorized access, or achieve their malicious objectives. These techniques exploit vulnerabilities and weaknesses in computer systems and networks by adversaries.

<mark style="background-color:yellow;">Step 1:</mark> Click the **Techniques** tab of the **RunbooksDB** module. &#x20;

<mark style="background-color:yellow;">Step 2:</mark> Click **New Technique**.&#x20;

<div align="left"><figure><img src="https://4252973360-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LXA6EayCcg12qfDcfXd%2Fuploads%2FN2aNYeToNyIMZYo9sJpZ%2Fimage.png?alt=media&#x26;token=3c4ed5c3-8c59-4e94-aeb3-909f82f0e2e8" alt="" width="563"><figcaption></figcaption></figure></div>

<mark style="background-color:yellow;">Step 3:</mark> Fill out the provided fields.

<div align="left"><figure><img src="https://4252973360-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LXA6EayCcg12qfDcfXd%2Fuploads%2FhlW7gEmFbwsDNraU1W9A%2Fimage.png?alt=media&#x26;token=2bdb2990-818a-4e01-ae82-e88218091ac2" alt="" width="563"><figcaption></figcaption></figure></div>

1. **Technique Title (required)**
2. **Technique ID (required)**
3. **Procedures**: Click **Add Procedures** to bring up a new modal to add procedures to the technique.&#x20;
4. **Tactic**: Click **Add Tactics** to bring up a new modal to add tactics to the technique.&#x20;
5. **Technique Description:** A rich-text field to enter any content, images, or tables to describe the technique.
6. **Tags:** Enter any tags to help future search and filtering tasks.

<mark style="background-color:yellow;">Step 4:</mark> Click **Save**.

The technique is now available from the **Techniques** tab, which can be viewed, edited, or deleted.
