center-for-threat-informed-defense / mappings-explorer

Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogued in the MITRE ATT&CK® knowledge base. These mappings form a bridge between the threat-informed approach to cybersecurity and the traditional security controls perspective.
https://ctid.io/mappings-explorer
Apache License 2.0
25 stars 6 forks source link

SSM-15: Add M365 Mappings to Explorer #92

Closed mikecarenzo closed 3 months ago

mikecarenzo commented 4 months ago

What Changed

This PR adds M365 Mappings to the Mappings Explorer.

Known Limitations

Build Artifacts cannot be produced until all Mappings are assigned a capability_group.

codecov[bot] commented 4 months ago

Codecov Report

Attention: Patch coverage is 0% with 14 lines in your changes are missing coverage. Please review.

Project coverage is 22.97%. Comparing base (52a13e3) to head (f3e6a5c).

:exclamation: Current head f3e6a5c differs from pull request most recent head 24083b4. Consider uploading reports for the commit 24083b4 to get more accurate results

Files Patch % Lines
src/mappings_explorer/site_builder.py 0.00% 14 Missing :warning:
Additional details and impacted files ```diff @@ Coverage Diff @@ ## main #92 +/- ## ========================================== - Coverage 23.17% 22.97% -0.20% ========================================== Files 11 11 Lines 1506 1519 +13 ========================================== Hits 349 349 - Misses 1157 1170 +13 ```

:umbrella: View full report in Codecov by Sentry.
:loudspeaker: Have feedback on the report? Share it here.