Skip to content

Commit f411e75

Browse files
authored
Merge branch 'main' into dev
2 parents 65e8b0f + f3db165 commit f411e75

File tree

2 files changed

+2
-15
lines changed

2 files changed

+2
-15
lines changed

.github/CODEOWNERS

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@
3434
/docs/governance/working-groups/communications @finos/ccc-wg-communications
3535
/docs/governance/working-groups/community-structure @finos/ccc-wg-community-structure
3636
/docs/governance/working-groups/delivery @finos/ccc-wg-delivery
37-
/docs/governance/working-groups/duplication-reduction @finos/ccc-wg-duplication-reduction
37+
/docs/governance/working-groups/duplication-reduction @finos/ccc-wg-community-structure
3838
/docs/governance/working-groups/security @finos/ccc-wg-security
3939
/docs/governance/working-groups/taxonomy @finos/ccc-wg-taxonomy
4040
#
@@ -66,10 +66,7 @@
6666
########
6767

6868
########
69-
#
70-
# Resource selection guidance and justifications must be reviewed by the Duplication Reduction WG
71-
/docs/resources/ @finos/ccc-wg-duplication-reduction
72-
#
69+
7370
########
7471

7572
########

docs/resources/foundations/mitre-engenuity.md

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,6 @@
44

55
MITRE Engenuity is a non-profit organization that operates under the MITRE Corporation, focused on advancing public good by driving innovative solutions and technologies. It collaborates with government, industry, and academia to address critical challenges in areas like cybersecurity, artificial intelligence, and healthcare. MITRE Engenuity is known for its threat-informed defense strategies, particularly its ATT&CK® framework, which enhances cybersecurity through collaborative research and threat intelligence sharing. By fostering cross-sector partnerships, it aims to accelerate the development of cutting-edge tools and methodologies that strengthen global security and innovation.
66

7-
- [Main Website](https://mitre-engenuity.org)
8-
97
## NIST 800-53 CONTROLS TO ATT&CK MAPPINGS
108

119
> "This project created a comprehensive set of mappings between MITRE ATT&CK® and NIST Special Publication 800-53 with supporting documentation and resources. These mappings provide a critically important resource for organizations to assess their security control coverage against real-world threats as described in the ATT&CK knowledge base and provide a foundation for integrating ATT&CK-based threat information into the risk management process. With over 6,300 individual mappings between NIST 800-53 and ATT&CK, this resource greatly reduces the burden on the community to do their own baseline mappings– allowing organizations to focus their limited time and resources on understanding how controls map to threats in their specific environment. "
@@ -41,10 +39,6 @@ Further, T1001.002 Steganography is mapped n:m back to 8 NIST 800-53 Controls, i
4139
- Att&ck 14.1, 12.1, 10.1, 9.0 and 8.2
4240
- Enterprise Att&ck domain
4341

44-
### Similar Work
45-
46-
- [M365 Native security capabilities vs Att&ck](https://mitre-engenuity.org/cybersecurity/center-for-threat-informed-defense/our-work/security-stack-mappings-microsoft-365/)
47-
4842
## Technique Inference Engine
4943

5044
> "Know your adversary’s next move with the Technique Inference Engine, a machine learning-powered tool that infers unseen adversary techniques, providing security teams actionable intelligence."
@@ -58,7 +52,3 @@ A model to infer an attacker’s next technique, based on observed adversary ope
5852
Given an Att&ck, e.g. T1001.002 Steganography (again), what techniques is an attacker likely to employ next? According to this tool, it will be:
5953

6054
![Screenshot 2024-09-12 at 14 49 06](https://github.com/user-attachments/assets/59835eb4-25ae-4598-838d-4c6facf650a7)
61-
62-
## Resource Links
63-
64-
- [News Page](https://mitre-engenuity.org/news-insights/)

0 commit comments

Comments
 (0)