Something a little different, this walkthrough mainly focuses on another of my open source tools, a Python 3 script called webpage2attack, designed to allow users to near-instantly process and convert a cyber threat intelligence (CTI) report containing MITRE ATT&CK identifiers into a json file formatted for use with the ATT&CK Navigator visualization tool.

But I follow this by showing how you can easily take that same Navigator "layer" file and drop it into a Control Validation Compass feature specifically designed to accommodate these files, and instantly surface relevant security control policy guidance, detection rules, and red team/offensive security test scripts aligned with your adversary TTP intelligence input.

webpage2attack GitHub repository
MITRE ATT&CK® Navigator
Control Validation Compass