Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogued in the MITRE ATT&CK® knowledge base. These mappings form a bridge between the threat-informed approach to cybersecurity and the traditional security controls perspective.
Built out pages for each ATT&CK technique
Pulled in Matrix branch to get the ATT&CK data needed, will need to be rebased after that PR is merged