center-for-threat-informed-defense/mappings-explorer
Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogued in the MITRE ATT&CK® knowledge base. These mappings form a bridge between the threat-informed approach to cybersecurity and the traditional security controls perspective.
JinjaApache-2.0
Stargazers
- 8bitsnowboarder
- akfincodeChicago, IL
- Ant3at5r
- apasasm
- austinsongerFormAssembly
- ben-elttamelttam
- cdgsec88
- coolenoid@Shell
- crod-git
- danzekChicago
- Digisilient
- fchyla@xebia
- ghost5683
- GrimManz
- hirocrafts東京 ⇔ US ⇔ WA
- IvanDrag0
- jadriangg1
- jakewarren
- jblukach@4n6ir
- kaerez
- karanthakakr04
- KinsanLau
- oddbjornFunkjazztical Tricknology
- raufridzuanSingapore
- rezaduty
- rnatellaFederico II University of Naples
- SarahWei0804
- shacthuluBitfire Security
- shashinmaZeroTrust Security (@ztsecurity)
- sivanahamer
- Stick-of-WuKong
- syetman
- tanbambooHangzhou, China
- Torch02@Microsoft
- Yu000910
- zclflyPeking University