# Cyber threat mapping

- [OBJECTIVE](/lexicanum/grc/cyber-threat-mapping/objective.md): This document aims to help you create attack diagrams based on the cyber threats targeting your information system. To achieve this, we will primarily use tools provided by MITRE.
- [PRIORITIZATION TABLE](/lexicanum/grc/cyber-threat-mapping/prioritization-table.md)
- [MITRE ATT\&CK](/lexicanum/grc/cyber-threat-mapping/mitre-att-and-ck.md)
- [INDICATOR OF COMPROMISE](/lexicanum/grc/cyber-threat-mapping/mitre-att-and-ck/indicator-of-compromise.md)
- [ATTACK FLOW PROJECT: CREATING THE ATTACK DIAGRAM](/lexicanum/grc/cyber-threat-mapping/attack-flow-project-creating-the-attack-diagram.md)
- [MITRE D3FEND](/lexicanum/grc/cyber-threat-mapping/mitre-d3fend.md)
- [VERIFY THE CAPABILITIES OF YOUR EDR/XDR](/lexicanum/grc/cyber-threat-mapping/verify-the-capabilities-of-your-edr-xdr.md)
- [CVE2CAPEC: CVE AND MITRE MAPPING](/lexicanum/grc/cyber-threat-mapping/cve2capec-cve-and-mitre-mapping.md)
