A web application assisting network defenders, analysts, and researchers in the process of mapping adversarial behaviors to MITRE ATT&CK, ACSC ISM and NIST 800-53 frameworks.
This issue will address the internal linking of search <-> mitigations (# use) <-> mitigation sources
A new set of pages have been developed as part of #22 to provide listing of mitigation sources, mitigations and relationships to techniques.
It should be noted that while the hierarchy is mitigation sources contain mitigations, the search result page does not link to mitigation sources, it links to mitigations and mitigation uses. The '# use' implies the use of an anchor to link directly to a use in a mitigation.
This issue will address the internal linking of search <-> mitigations (# use) <-> mitigation sources
A new set of pages have been developed as part of #22 to provide listing of mitigation sources, mitigations and relationships to techniques.
It should be noted that while the hierarchy is mitigation sources contain mitigations, the search result page does not link to mitigation sources, it links to mitigations and mitigation uses. The '# use' implies the use of an anchor to link directly to a use in a mitigation.