ESProfiler

Filters

Frameworks

ISO 42001

ISO 42001

International Organization for Standardization(ISO)

ISO/IEC 42001 is the international standard that specifies requirements and provides guidance for establishing, implementing, maintaining, and continually improving an Artificial Intelligence Management System (AIMS) within the context of an organization.

Compliance
MITRE ATLAS

MITRE ATLAS

MITRE

ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) is a globally accessible, living knowledge base of adversary tactics and techniques against Al-enabled systems based on real-world attack observations and realistic demonstrations from Al red teams and security groups.

Adversary Behavior
ICS ATT&CK

ICS ATT&CK

MITRE

MITRE ATT&CK® for ICS is a globally-accessible knowledge base of adversary tactics and techniques reflecting real-world observations of cyber attacks against Industrial Control Systems (ICS). It is tailored specifically to the unique operational technology (OT) environments, adversary behaviors, and attack methods found in critical infrastructure sectors like manufacturing, energy, and utilities. The framework focuses on the actions attackers take to compromise or disrupt physical processes, often by targeting devices and protocols unique to ICS.

Adversary Behavior
Mobile ATT&CK

Mobile ATT&CK

MITRE

MITRE ATT&CK® for Mobile is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations of mobile device attacks. The framework is tailored to the unique attack vectors of mobile platforms, covering techniques for both Android and iOS. It details adversary behaviors from initial access (e.g., Phishing, Drive-by Compromise) and device-level exploitation to network-based effects that can be used without direct device access.

Adversary Behavior
MITRE D3FEND

MITRE D3FEND

MITRE

Extracted Defensive Tactics and their Techniques / Sub-techniques from MITRE D3FEND.

Defensive
NIST AI RMF

NIST AI RMF

National Institute of Standards and Technology

The NIST AI Risk Management Framework is intended for voluntary use and to improve the ability to incorporate trustworthiness considerations into the design, development, use, and evaluation of AI products, services, and systems.

Compliance
ISO 27001

ISO 27001

International Organization for Standardization(ISO)

ISO/IEC 27001:2022 is the preeminent international standard for establishing, implementing, and maintaining an Information Security Management System (ISMS). Unlike strictly technical frameworks, ISO 27001 adopts a risk-based, holistic approach that synchronizes people, processes, and technology to safeguard the confidentiality, integrity, and availability of data. It serves as a governance umbrella, providing a structured methodology for organizations of any size to proactively identify vulnerabilities and manage cyber risks within a cycle of continuous improvement. \The framework’s controls are utilized to transition from reactive security to a state of operational excellence and global compliance. By implementing these standardized safeguards, organizations can demonstrate best-practice security to stakeholders, satisfy stringent regulatory requirements, and build a resilient defense against an evolving threat landscape. While NIST CSF focuses on cybersecurity outcomes and MITRE ATT&CK maps specific adversary behaviors, ISO 27001 provides the rigorous management foundation and auditable certification necessary for long-term security governance and trust.

Compliance
Enterprise ATT&CK

Enterprise ATT&CK

MITRE

MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques...

Adversary Behavior
Insider Threat Matrix

Insider Threat Matrix

Forscie

The Insider Threat Matrix™ (ITM) is designed to help investigators map the trajectory of an insider incident—both before and after an infringement. It provides a structured approach to categorizing evidence and articulating the motive, means, and methods used by subjects of insider investigations. The ITM unifies diverse concepts and terminology for digital investigators, offering a common language that bridges people, processes, and technology. Its goal is to improve how we address the growing challenge of computer-enabled insider threats.

Adversary Behavior
Cyber Kill Chain

Cyber Kill Chain

Lockheed Martin

A comprehensive capability mapping framework based on the Lockheed Martin Cyber Kill Chain. This model maps defensive capabilities against the seven universal phases of an intrusion. It provides deep context for each 'Course of Action' (Detect, Deny, Disrupt, Degrade, Deceive, Destroy), detailing exactly how that specific defensive maneuver mitigates the adversary's unique objectives in that specific phase of the attack lifecycle.

Adversary Behavior
MITRE ENGAGE

MITRE ENGAGE

MITRE

MITRE ENGAGE™ (Adversary Engagement Guidance) is a framework of defensive cyber engagement goals, approaches, and activities based on real-world threat interactions.

Defensive
PBOM OSCAR

PBOM OSCAR

OSCAR Project (Source)

A behavioral model based on the Open Software Supply Chain Attack Reference (OSC&R) from the PBOM.dev community. It catalogs adversary tactics and techniques specifically targeting the software supply chain, including CI/CD pipelines, code repositories, and open-source dependencies.

Adversary Behavior
ESP Products Taxonomy

ESP Products Taxonomy

ESPROFILER

A structured catalog of cybersecurity domains and categories that are commonly observed across the cybersecurity industry.

Taxonomy
Mitre F3

Mitre F3

MITRE

The MITRE Fight Fraud Framework™ (F3) is a curated knowledge base of tactics and techniques used by financial fraud actors, derived from real-world observations of cyber fraud incidents. The framework includes behaviors that characterize known fraud TTPs and references existing MITRE ATT&CK® cyber techniques as applicable to financial fraud. F3 provides a common structure and taxonomy to consistently describe and enumerate the material events of a cyber fraud incident, enabling stronger collaboration on fraud prevention, detection, and response across organizational teams. The knowledge base is globally accessible, open, and available at no charge to any person or organization.

Adversary Behavior
NIST CSF

NIST CSF

National Institute of Standards and Technology

The NIST Cybersecurity Framework (CSF) 2.0 is a voluntary framework consisting of standards, guidelines, and best practices to manage cybersecurity risk. Created through collaboration between government and the private sector, it provides a common organizing structure for multiple approaches to cybersecurity by assembling standards, guidelines, and practices that are working effectively today. The Framework is not a one-size-fits-all approach to managing cybersecurity risk; organizations should use it as a starting point to determine their specific needs.

Compliance
Cyber Defence Matrix

Cyber Defence Matrix

Sounil Yu

The Cyber Defence Matrix is a security framework that maps defensive functions (Identify, Protect, Detect, Respond, Recover) against key asset owners (Customer, Third Party, Employee, Threat Actor) and asset classes (Devices, Networks, Applications, Data, Users) to structure and organize cybersecurity capabilities.

Defensive
CIS Controls

CIS Controls

Center for Internet Security

The CIS Critical Security Controls (CIS Controls) are a prescriptive, prioritized, and simplified set of best practices that you can use to strengthen your cybersecurity posture. Today, thousands of cybersecurity practitioners from around the world use the CIS Controls and/or contribute to their development via a community consensus process.

Compliance
NCSC CAF

NCSC CAF

National Cyber Security Centre (NCSC)

A compliance framework from the UK's National Cyber Security Centre (NCSC) for organizations operating the UK's vital services (e.g., CNI, NIS-regulated). It defines key outcomes and principles to help these organizations achieve and demonstrate cyber resilience for their 'essential functions' across both IT and Operational Technology (OT) systems.

Compliance

My Stack

Map to security frameworks
See how your products align to NIST 800-53, ISO 27001 and SOC 2 controls so you can evidence coverage in seconds.
Spot coverage gaps
Quickly identify missing capabilities across endpoint, cloud, app security and more to guide your roadmap.
Compare vendors & products
Understand which products drive overlapping capabilities and where you can consolidate spend.