Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogued in the MITRE ATT&CK® knowledge base. These mappings form a bridge between the threat-informed approach to cybersecurity and the traditional security controls perspective.
Parsed mapping written into yaml, json, and csv files
Mappings parsed into newest iteration of the unified data schema
Limitations
Schema will likely be iterated on, and the data structures may need to change.
Some project metadata fields are empty
It has not yet been decided whether each attack object will have a metadata object attached to it, or if there will be only one metadata object per project. In this iteration of the parsings, each attack object has a metadata object attached.
Fixes #36
What Changed
yaml
,json
, andcsv
filesLimitations