It is possible to link specific techniques and/or sub-techniques to a correlation rule, enabling the mapping and indicators of security coverage.
Last updated 2 years ago