{"id":41536,"date":"2021-06-29T18:00:11","date_gmt":"2021-06-29T18:00:11","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/\/?p=93822"},"modified":"2021-06-29T18:00:11","modified_gmt":"2021-06-29T18:00:11","slug":"mitre-attck-mappings-released-for-built-in-azure-security-controls","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/mitre-attck-mappings-released-for-built-in-azure-security-controls\/","title":{"rendered":"MITRE ATT&amp;CK\u00ae mappings released for built-in Azure security controls"},"content":{"rendered":"<p>The <a href=\"https:\/\/medium.com\/mitre-engenuity\/security-control-mappings-a-starting-point-for-threat-informed-defense-a3aab55b1625\" target=\"_blank\" rel=\"noopener\">Security Stack Mappings for Azure research project<\/a> was published today, introducing a library of mappings that link built-in Azure security controls to the MITRE ATT&amp;CK\u00ae techniques they mitigate against. Microsoft once again worked with the <a href=\"https:\/\/mitre-engenuity.org\/ctid\/\" target=\"_blank\" rel=\"noopener\">Center for Threat-Informed Defense<\/a> and other Center members to publish the mappings, which pair the familiar language of the ATT&amp;CK framework with the concrete coverage Azure provides to protect organizations\u2019 attack surfaces. Microsoft is pleased that community interest in seeing such mappings for Azure led to its use as the pilot cloud platform for this endeavor.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-93831\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/06\/Azure_platform_native_security_controls.jpg\" alt width=\"1056\" height=\"816\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/06\/Azure_platform_native_security_controls.jpg 1056w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/06\/Azure_platform_native_security_controls-300x232.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/06\/Azure_platform_native_security_controls-1024x791.jpg 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/06\/Azure_platform_native_security_controls-768x593.jpg 768w\" sizes=\"auto, (max-width: 1056px) 100vw, 1056px\"><\/p>\n<p>The project aims to fill an information gap for organizations seeking proactive security awareness about the scope of coverage available natively in Azure. The project does this by creating independent data showing how built-in security controls for a given technology platform, in this case Azure, secure their assets against the adversary tactics, techniques, and procedures (TTPs) most likely to target them.<\/p>\n<p>Microsoft has worked to expand the suite of built-in security controls in Azure which, while highly effective for protecting customer environments, can feel overwhelming to understand across an organization\u2019s entire Azure estate. MITRE has developed the ATT&amp;CK framework into a highly respected, community-supported tool for clarifying adversary TTPs. Pairing the two together provides a helpful view for organizations to understand their readiness against today\u2019s threats in a familiar vocabulary that enables easy communication to their stakeholders.<\/p>\n<p>Aside from the mapping files, key project deliverables include a methodology that describes how the project team assessed the mappings and a scoring rubric to explain how the mapping scores were decided. Accompanying the methodology and scoring rubric are a YAML data format that houses each mapping and a mapping tool that validates and produces corresponding ATT&amp;CK Navigator layer files for easy visualization. The ATT&amp;CK Navigator view is particularly useful for assessing multiple security controls concurrently to identify similarities or differences in coverage capabilities.<\/p>\n<h2>Azure\u2019s built-in security controls map to broad ATT&amp;CK technique coverage<\/h2>\n<p>The Security Stack Mappings research project was undertaken in response to the lack of data available to explain how a technology platform\u2019s built-in security controls mitigate against adversary TTPs as described by ATT&amp;CK techniques. Azure was chosen for the inaugural iteration of this research, with plans for the Center to repeat the process for other technology platforms in the future.<\/p>\n<p>The methodology distinguishes between security controls that function independently and features that can be enabled as part of another product or service, choosing only the former as candidates for mappings.<\/p>\n<p>The scoring rubric is comprised of three main factors:<\/p>\n<ul>\n<li>The intended function of the security control\u2014whether it is meant to protect, detect, or respond to an adversary behavior.<\/li>\n<li>The coverage level of the control for the mapped ATT&amp;CK technique\u2014minimal, partial, or significant.<\/li>\n<li>Factors found to be useful considerations for assessing a mapping\u2014coverage, temporal (real-time, periodic, or externally triggered), and accuracy (such as false positive or false negative rates).<\/li>\n<\/ul>\n<p>The list of Azure security controls that were mapped was compiled by the Center, with input from Microsoft and other Center members. Part of the list was based on the <a href=\"https:\/\/docs.microsoft.com\/en-us\/security\/benchmark\/azure\/overview\" target=\"_blank\" rel=\"noopener\">Azure Security Benchmark (v2)<\/a>, previously published by Microsoft, which provides guidance on best practices and recommendations for improving the security of workloads, data, and services on Azure. As many organizations are now using ATT&amp;CK to keep track of their overall security posture, Microsoft is pleased to be able to support them through the ready-made mappings produced through this project.<\/p>\n<p>For a list of the Azure security controls that were mapped, see the <a href=\"https:\/\/center-for-threat-informed-defense.github.io\/security-stack-mappings\/Azure\/README.html#controls\" target=\"_blank\" rel=\"noopener\">Center\u2019s list of Azure controls<\/a>.<\/p>\n<p>Each control was mapped to one or more techniques and categorized using thematic tags for an alternate coverage view. For example, the \u201cAnalytics\u201d tag returns the following set of controls:<\/p>\n<ul>\n<li>Azure Alerts for Network Layer<\/li>\n<li>Azure Network Traffic Analytics<\/li>\n<li>Azure Sentinel<\/li>\n<\/ul>\n<p>Whereas the \u201cContainers\u201d tag returns this set:<\/p>\n<ul>\n<li>Azure Defender for Container Registries<\/li>\n<li>Azure Defender for Kubernetes<\/li>\n<li>Docker Host Hardening<\/li>\n<\/ul>\n<p>Microsoft previously partnered with the Center and other Center members to develop the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/04\/29\/center-for-threat-informed-defense-teams-up-with-microsoft-partners-to-build-the-attck-for-containers-matrix\/\" target=\"_blank\" rel=\"noopener\">ATT&amp;CK for Containers matrix<\/a>, which used the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/03\/23\/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes\/\" target=\"_blank\" rel=\"noopener\">threat matrix for Kubernetes<\/a> developed by the <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/security-center\/\" target=\"_blank\" rel=\"noopener\">Azure Security Center<\/a> team for <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security-center\/container-security\" target=\"_blank\" rel=\"noopener\">Azure Defender for Kubernetes<\/a>, as a starting point to expand on. You may notice that the mapped techniques for the container security controls above don\u2019t reference some of those newly added in the ATT&amp;CK for Containers matrix as part of the release of ATT&amp;CK v9 in April 2021. As this ATT&amp;CK version was released mid-project, the team chose to focus on ATT&amp;CK v8 instead, with plans to update mappings to ATT&amp;CK v9 already in the works.<\/p>\n<h2>Just the beginning for technology platform mappings<\/h2>\n<p>With the successful completion of the Security Stack Mappings for Azure research project, Microsoft and the rest of the industry now have a consistent, repeatable approach available to use for mapping built-in security controls to ATT&amp;CK techniques. As Microsoft continues to expand the built-in tools available to protect customer workloads, data, and services in Azure, and as MITRE continues to expand the number of adversary TTPs described by the ATT&amp;CK matrices, there will be new mappings available to help organizations make sense of their security coverage level. Microsoft will continue to support community efforts such as this to enable easier understanding and communication of security coverage wherever we can.<\/p>\n<p>To learn more about Microsoft Security solutions, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\" target=\"_blank\" rel=\"noopener\">visit our&nbsp;<\/a><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\" target=\"_blank\" rel=\"noopener\">website.<\/a> Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/06\/29\/mitre-attck-mappings-released-for-built-in-azure-security-controls\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft is pleased to announce the publication of the Security Stack Mappings for Azure project in partnership with the Center for Threat-Informed Defense.<br \/>\nThe post MITRE ATT&#038;CK\u00ae mappings released for built-in Azure security controls appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":41537,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347],"class_list":["post-41536","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>MITRE ATT&amp;CK\u00ae mappings released for built-in Azure security controls 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/mitre-attck-mappings-released-for-built-in-azure-security-controls\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MITRE ATT&amp;CK\u00ae mappings released for built-in Azure security controls 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/mitre-attck-mappings-released-for-built-in-azure-security-controls\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-29T18:00:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/06\/mitre-attck-mappings-released-for-built-in-azure-security-controls.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1056\" \/>\n\t<meta property=\"og:image:height\" content=\"816\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/mitre-attck-mappings-released-for-built-in-azure-security-controls\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/mitre-attck-mappings-released-for-built-in-azure-security-controls\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"MITRE ATT&amp;CK\u00ae mappings released for built-in Azure security controls\",\"datePublished\":\"2021-06-29T18:00:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/mitre-attck-mappings-released-for-built-in-azure-security-controls\/\"},\"wordCount\":970,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/mitre-attck-mappings-released-for-built-in-azure-security-controls\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/06\/mitre-attck-mappings-released-for-built-in-azure-security-controls.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/mitre-attck-mappings-released-for-built-in-azure-security-controls\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/mitre-attck-mappings-released-for-built-in-azure-security-controls\/\",\"name\":\"MITRE ATT&amp;CK\u00ae mappings released for built-in Azure security controls 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/mitre-attck-mappings-released-for-built-in-azure-security-controls\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/mitre-attck-mappings-released-for-built-in-azure-security-controls\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/06\/mitre-attck-mappings-released-for-built-in-azure-security-controls.jpg\",\"datePublished\":\"2021-06-29T18:00:11+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/mitre-attck-mappings-released-for-built-in-azure-security-controls\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/mitre-attck-mappings-released-for-built-in-azure-security-controls\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/mitre-attck-mappings-released-for-built-in-azure-security-controls\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/06\/mitre-attck-mappings-released-for-built-in-azure-security-controls.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/06\/mitre-attck-mappings-released-for-built-in-azure-security-controls.jpg\",\"width\":1056,\"height\":816},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/mitre-attck-mappings-released-for-built-in-azure-security-controls\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"MITRE ATT&amp;CK\u00ae mappings released for built-in Azure security controls\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"MITRE ATT&amp;CK\u00ae mappings released for built-in Azure security controls 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/mitre-attck-mappings-released-for-built-in-azure-security-controls\/","og_locale":"en_US","og_type":"article","og_title":"MITRE ATT&amp;CK\u00ae mappings released for built-in Azure security controls 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/mitre-attck-mappings-released-for-built-in-azure-security-controls\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-06-29T18:00:11+00:00","og_image":[{"width":1056,"height":816,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/06\/mitre-attck-mappings-released-for-built-in-azure-security-controls.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/mitre-attck-mappings-released-for-built-in-azure-security-controls\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/mitre-attck-mappings-released-for-built-in-azure-security-controls\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"MITRE ATT&amp;CK\u00ae mappings released for built-in Azure security controls","datePublished":"2021-06-29T18:00:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/mitre-attck-mappings-released-for-built-in-azure-security-controls\/"},"wordCount":970,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/mitre-attck-mappings-released-for-built-in-azure-security-controls\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/06\/mitre-attck-mappings-released-for-built-in-azure-security-controls.jpg","keywords":["Cybersecurity"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/mitre-attck-mappings-released-for-built-in-azure-security-controls\/","url":"https:\/\/www.threatshub.org\/blog\/mitre-attck-mappings-released-for-built-in-azure-security-controls\/","name":"MITRE ATT&amp;CK\u00ae mappings released for built-in Azure security controls 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/mitre-attck-mappings-released-for-built-in-azure-security-controls\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/mitre-attck-mappings-released-for-built-in-azure-security-controls\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/06\/mitre-attck-mappings-released-for-built-in-azure-security-controls.jpg","datePublished":"2021-06-29T18:00:11+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/mitre-attck-mappings-released-for-built-in-azure-security-controls\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/mitre-attck-mappings-released-for-built-in-azure-security-controls\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/mitre-attck-mappings-released-for-built-in-azure-security-controls\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/06\/mitre-attck-mappings-released-for-built-in-azure-security-controls.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/06\/mitre-attck-mappings-released-for-built-in-azure-security-controls.jpg","width":1056,"height":816},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/mitre-attck-mappings-released-for-built-in-azure-security-controls\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"MITRE ATT&amp;CK\u00ae mappings released for built-in Azure security controls"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41536","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=41536"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41536\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/41537"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=41536"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=41536"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=41536"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}