Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogued in the MITRE ATT&CK® knowledge base. These mappings form a bridge between the threat-informed approach to cybersecurity and the traditional security controls perspective.
Terminology order:
Make sure all templates have consistent naming convention and function definitions reference proper terminology Also update text on website itself