Skip to content
This repository has been archived by the owner on Apr 3, 2024. It is now read-only.

Commit

Permalink
Merge pull request #68 from center-for-threat-informed-defense/fixed-…
Browse files Browse the repository at this point in the history
…typo-1

Fixed typo
  • Loading branch information
isaisabel authored Jun 2, 2021
2 parents 2125ef0 + b9df685 commit 6133f34
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion docs/use-cases.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ Because techniques can map to multiple controls, it is likely that there will be

### 3. I want to determine what security controls I should use to implement a given ATT&CK mitigation

Mitigations in ATT&CK are mapped to techniques, and this proejct maps techniques to security controls. One possible interpretation of “implementing” a mitigation may be finding the set of security controls that mitigates the techniques that are mapped to the mitigation. This then resolves to an extension of [use case 2](#2-i-want-to-know-what-security-controls-to-selectimplement-in-order-to-mitigate-a-specific-set-of-techniques), where the set of techniques is those associated with the ATT&CK Mitigation.
Mitigations in ATT&CK are mapped to techniques, and this project maps techniques to security controls. One possible interpretation of “implementing” a mitigation may be finding the set of security controls that mitigates the techniques that are mapped to the mitigation. This then resolves to an extension of [use case 2](#2-i-want-to-know-what-security-controls-to-selectimplement-in-order-to-mitigate-a-specific-set-of-techniques), where the set of techniques is those associated with the ATT&CK Mitigation.

Visualization of this indirect mapping should be undertaken with care. It should not be implied that a security control maps directly to a mitigation or vice versa, since that is firstly inaccurate to the data model and some of those derived “mappings” could be confusing in certain cases. The intermediate step of the technique must therefore always be shown in visualizations of these two-step mappings. ATT&CK Mitigations should be interpreted as a “contextual grouping” of techniques, and the visualization should convey that the actual mappings happen with the contextually-grouped techniques, not the mitigation or other grouping object.

Expand Down

0 comments on commit 6133f34

Please sign in to comment.