A web application assisting network defenders, analysts, and researchers in the process of mapping adversarial behaviors to MITRE ATT&CK, ACSC ISM and NIST 800-53 frameworks.
Other
4
stars
1
forks
source link
Mitigation Use Card on Search should include the Mitigation Identifier #31
The current card for mitigation use includes the source next to the name of the mitigation.
eg: Mitigation Use: (Credentials from Password Stores. Password Policies) [MITRE]
This should be updated to either replace the source (in this case MITRE) with the Identifier (M1027) or include it (eg, MITRE - M1027).