Templates you can use to quickly customize or jump start work with the Cybersecurity Maturity Matrix.
- Customize row headings on the Cybersecurity Maturity Matrix site
- Export JSON
- Clone this repository, add your file and a row at the bottom of the table with details, and submit a PR
- Locate the template you want to use
- Right-click and "Save link as" to save the .json file locally
- On the Cybersecurity Maturity Matrix site, use "Restore JSON" to upload the .json file
These files populate the y-axis, and contain alternative asset classes, security domains, and threats.
Name | Type | Author | Notes |
---|---|---|---|
Cyber Defense Matrix | Assets | Sounil Yu | https://cyberdefensematrix.com |
Top intial access vectors (2022) | Threats | Keith McCammon | https://kwm.me/articles/top-initial-access-vectors-2022/ |
These files populate the the data, or inner cells on the matrix.
Not accepting these at this time :|