Mappings Explorer is valuable to a broad range of cyber professionals, through customizable understanding of how security controls and capabilities map onto the adversary behaviors catalogued in the MITRE ATT&CK® knowledge base. These users encompass many roles and responsibilities associated with organizational cyber defense, risk management, threat prevention and detection, and incident response. These roles and responsibilities include:.
Responsible for response, management, and coordination, and remediation activities for cyber incidents such as malware infections, data theft, ransomware encryption, denial of service, and control systems intrusions.
Responsible for carrying out information security policies, procedures, and controls, and providing primary interface between senior managers and information system owners.
Responsibilities include ensuring the appropriate operational security posture is maintained for information systems or programs.
Responsibilities include monitoring an organization’s networks and systems to detect threats and investigating potential security incidents.
Responsibilities include developing and implementing security controls and solutions to protect networks and systems from unauthorized access and attacks.
Responsibilities include identifying and studying security vulnerabilities in systems or software to identify weaknesses and improve security.
Responsibilities include collecting data and information from various sources across the threat landscape to identify, assess, and recommend countermeasures for cyber threats.
The Mappings Explorer website enables the following essential abilities:
This section describes user stories for the Mappings Explorer website based on the roles identified above. These user stories are expressed as the who, what, and why, with a short exploration of how a user story may be achieved. This is not meant to be a comprehensive list, but rather examples to demonstrate how Mappings Explorer could be used.