The following ATT&CK Navigator layers represent the mappings from ATT&CK to nist800-53-r4:
- nist800-53-r4 overview ( download | view )
- Access Control overview ( download | view )
- AC-2 mappings ( download | view )
- AC-3 mappings ( download | view )
- AC-4 mappings ( download | view )
- AC-5 mappings ( download | view )
- AC-6 mappings ( download | view )
- AC-7 mappings ( download | view )
- AC-8 mappings ( download | view )
- AC-10 mappings ( download | view )
- AC-11 mappings ( download | view )
- AC-12 mappings ( download | view )
- AC-14 mappings ( download | view )
- AC-16 mappings ( download | view )
- AC-17 mappings ( download | view )
- AC-18 mappings ( download | view )
- AC-19 mappings ( download | view )
- AC-20 mappings ( download | view )
- AC-21 mappings ( download | view )
- AC-23 mappings ( download | view )
- Security Assessment And Authorization overview ( download | view )
- Configuration Management overview ( download | view )
- Contingency Planning overview ( download | view )
- Identification And Authentication overview ( download | view )
- IA-2 mappings ( download | view )
- IA-3 mappings ( download | view )
- IA-4 mappings ( download | view )
- IA-5 mappings ( download | view )
- IA-6 mappings ( download | view )
- IA-7 mappings ( download | view )
- IA-8 mappings ( download | view )
- IA-9 mappings ( download | view )
- IA-11 mappings ( download | view )
- Media Protection overview ( download | view )
- Planning overview ( download | view )
- Risk Assessment overview ( download | view )
- System And Services Acquisition overview ( download | view )
- SA-3 mappings ( download | view )
- SA-4 mappings ( download | view )
- SA-8 mappings ( download | view )
- SA-10 mappings ( download | view )
- SA-11 mappings ( download | view )
- SA-12 mappings ( download | view )
- SA-13 mappings ( download | view )
- SA-14 mappings ( download | view )
- SA-15 mappings ( download | view )
- SA-16 mappings ( download | view )
- SA-17 mappings ( download | view )
- SA-19 mappings ( download | view )
- SA-22 mappings ( download | view )
- System And Communications Protection overview ( download | view )
- SC-2 mappings ( download | view )
- SC-3 mappings ( download | view )
- SC-4 mappings ( download | view )
- SC-7 mappings ( download | view )
- SC-8 mappings ( download | view )
- SC-10 mappings ( download | view )
- SC-12 mappings ( download | view )
- SC-16 mappings ( download | view )
- SC-17 mappings ( download | view )
- SC-18 mappings ( download | view )
- SC-20 mappings ( download | view )
- SC-21 mappings ( download | view )
- SC-22 mappings ( download | view )
- SC-23 mappings ( download | view )
- SC-26 mappings ( download | view )
- SC-28 mappings ( download | view )
- SC-29 mappings ( download | view )
- SC-30 mappings ( download | view )
- SC-31 mappings ( download | view )
- SC-34 mappings ( download | view )
- SC-35 mappings ( download | view )
- SC-36 mappings ( download | view )
- SC-37 mappings ( download | view )
- SC-39 mappings ( download | view )
- SC-41 mappings ( download | view )
- SC-44 mappings ( download | view )
- System And Information Integrity overview ( download | view )
- SI-2 mappings ( download | view )
- SI-3 mappings ( download | view )
- SI-4 mappings ( download | view )
- SI-5 mappings ( download | view )
- SI-7 mappings ( download | view )
- SI-8 mappings ( download | view )
- SI-10 mappings ( download | view )
- SI-12 mappings ( download | view )
- SI-15 mappings ( download | view )
- SI-16 mappings ( download | view )
- impact=LOW mappings ( download | view )
- impact=MODERATE mappings ( download | view )
- impact=HIGH mappings ( download | view )
- priority=P1 mappings ( download | view )
- priority=P2 mappings ( download | view )
- priority=P0 mappings ( download | view )
- priority=P3 mappings ( download | view )
- Access Control overview ( download | view )