49 Forks
299 Stars
299 Watchers

security-stack-mappings

This project empowers defenders with independent data on which native security controls of leading technology platforms are most useful in defending against the adversary TTPs they care about.

How to download and setup security-stack-mappings

Open terminal and run command
git clone https://github.com/center-for-threat-informed-defense/security-stack-mappings.git
git clone is used to create a copy or clone of security-stack-mappings repositories. You pass git clone a repository URL.
it supports a few different network protocols and corresponding URL formats.

Also you may download zip file with security-stack-mappings https://github.com/center-for-threat-informed-defense/security-stack-mappings/archive/master.zip

Or simply clone security-stack-mappings with SSH
[email protected]:center-for-threat-informed-defense/security-stack-mappings.git

If you have some problems with security-stack-mappings

You may open issue on security-stack-mappings support forum (system) here: https://github.com/center-for-threat-informed-defense/security-stack-mappings/issues