Last updated 12 months ago
It is possible to link specific techniques and/or sub-techniques to a correlation rule, enabling the mapping and indicators of security coverage.