Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogued in the MITRE ATT&CK® knowledge base. The Center for Threat-Informed Defense created these open source mappings to serve as a bridge between the threat-informed approach to cybersecurity and the traditional perspective applied to the employment of security controls.
Mappings Explorer presents threat and mitigation data in easily accessible and customizable ways. This centralized collection of resources expands the ability of the global cyber community to make threat-informed decisions by exploring real-world cyber threats and corresponding mapped security capabilities.
You can use Mappings Explorer for many different purposes. Examples of usage include:
Explore how security controls and capabilities can be used to protect from, detect, or respond to specific adversary behaviors.
Understand how adversaries might exploit unpatched vulnerabilities and what adversaries may achieve by exploiting the vulnerability.
Visualize and assess deficiencies in cyber defense to plan future policy and security controls around real-world adversary behavior.
Create detailed incident reports incorporating ATT&CK-based threat intel, recommendations for increased security protocols, and response measures.
Are you using the Center for Threat-Informed Defense's mappings projects? Do you have questions or feedback? Get in touch with us!
Email Us