top of page

Mapping the ATT&CK Framework to CIS Controls

This is a wonderful illustration of the process that many of us should consider working through – how does a particular threat framework map to our existing security framework.  In this situation, the author is attempting to map the ATT&CK framework to the CIS Critical Controls, but this exercise could just as easily have involved NIST or FFIEC or another framework.  Consider the value of exploring and recognizing your strengths and weaknesses in a more real-time sense.

1 view

Recent Posts

See All

Rethinking Software in the Organizational Hierarchy

I very much enjoyed this article from Pieter Danhieux via Dark Reading and this creative approach to the management of applications and hierarchical security. The concept of least privilege and the d


bottom of page