-
Notifications
You must be signed in to change notification settings - Fork 216
Open
Description
This is a summary of the features requests I received (in random order):
- The ability to import ATT&CK™ data sets using the tool itself.
- Add custom techniques not listed in ATT&CK™ (insider threat and fraud focused).
- Incorporate more red-teams playbooks, similar to atomic-red-team™.
- Start a plan by importing ATT&CK™ navigator exports.
- Ability to define targets and assign a "testing guideline" to each, allowing users to input components of their systems in terms of access/process/technology (what is being defended).
- Integrate the tool with CALDERA™ to generate tests.
- Create macOS & Linux versions.
- Open source the tool.
- Exporting plans for sharing.
- Map NIST SP 800-53 controls to techniques (other controls SOX, PCI, FFIEC).
- Allow users to enter known vulnerability data for systems (like Kenna or NVD).
- Add technique scoring cost/difficulty/discoverability for attack tree modeling (technique based attack probability and simulation).
Thank you all for your feedback, if you would like to add a new feature or feedback about a requested feature, please add it here or email me directly at nader@nosecurecode.com
Metadata
Metadata
Assignees
Labels
No labels