зеркало из
https://github.com/ceios/ceios.git
synced 2025-10-29 04:04:13 +02:00
44 строки
1.6 KiB
ReStructuredText
44 строки
1.6 KiB
ReStructuredText
Attack Flow |version|
|
|
=====================
|
|
|
|
Attack Flow is a language for describing how cyber adversaries combine and sequence
|
|
various offensive techniques to achieve their goals. The project helps defenders and
|
|
leaders understand how adversaries operate and improve their own defensive posture. This
|
|
project is created and maintained by the `MITRE Engenuity Center for Threat-Informed
|
|
Defense <https://ctid.mitre-engenuity.org/>`__ in futherance of our mission to advance
|
|
the state of the art and the state of the practice in threat-informed defense
|
|
globally. The project is funded by our `research participants
|
|
<https://ctid.mitre-engenuity.org/our-work/attack-flow/#RESEARCH-PARTICIPANTS>`__.
|
|
|
|
.. toctree::
|
|
:maxdepth: 2
|
|
:caption: Contents
|
|
|
|
overview
|
|
introduction
|
|
example_flows
|
|
builder
|
|
visualization
|
|
language
|
|
best_practices
|
|
developers
|
|
owl_approach
|
|
changelog
|
|
|
|
Notice
|
|
------
|
|
|
|
© 2022 MITRE Engenuity. Approved for public release. Document number CT0040.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this
|
|
file except in compliance with the License. You may obtain a copy of the License at
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software distributed under
|
|
the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
|
|
KIND, either express or implied. See the License for the specific language governing
|
|
permissions and limitations under the License.
|
|
|
|
This project makes use of ATT&CK®: `ATT&CK Terms of Use
|
|
<https://attack.mitre.org/resources/terms-of-use/>`__
|