Skip to content

Commit

Permalink
Merge pull request #93 from center-for-threat-informed-defense/AF-173…
Browse files Browse the repository at this point in the history
…-update-ir-docs

AF-173 Update docs
  • Loading branch information
mikecarenzo committed Jul 28, 2023
2 parents eb2b02d + 3694a50 commit 17bcc8f
Show file tree
Hide file tree
Showing 3 changed files with 19 additions and 18 deletions.
1 change: 1 addition & 0 deletions docs/builder.rst
Original file line number Diff line number Diff line change
Expand Up @@ -181,6 +181,7 @@ Alternatively, you can run the Attack Flow Builder with Docker Compose:
* `install Docker <https://docs.docker.com/engine/install>`_
* run the following commands in a terminal:
.. code:: shell
$ curl https://raw.githubusercontent.com/center-for-threat-informed-defense/attack-flow/main/docker-compose.yml
Expand Down
17 changes: 17 additions & 0 deletions docs/index.rst
Original file line number Diff line number Diff line change
Expand Up @@ -24,3 +24,20 @@ globally. The project is funded by our `research participants
developers
owl_approach
changelog

Notice
------

© 2022 MITRE Engenuity. Approved for public release. Document number CT0040.

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this
file except in compliance with the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software distributed under
the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
KIND, either express or implied. See the License for the specific language governing
permissions and limitations under the License.

This project makes use of ATT&CK®: `ATT&CK Terms of Use
<https://attack.mitre.org/resources/terms-of-use/>`__
19 changes: 1 addition & 18 deletions docs/overview.rst
Original file line number Diff line number Diff line change
Expand Up @@ -71,7 +71,7 @@ that executives do not need to make a business decision. Defenders can use flows
communicate the impact of an attack in business terms (i.e. money) and make a convincing
case for new tools, personnel, or security controls to prioritize.

**Lessons Learned**
**Incident Reponse**

Incident responders can use Attack Flow to improve their incident response (IR) planning
and after-action review. After a security incident has occurred, responders can create
Expand Down Expand Up @@ -134,20 +134,3 @@ for building up a full understanding of the project:
* The `GitHub repository
<https://github.com/center-for-threat-informed-defense/attack-flow>`__ is ready for
your contributions -- issues and pull requests are welcome!

Notice
------

© 2022 MITRE Engenuity. Approved for public release. Document number CT0040.

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this
file except in compliance with the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software distributed under
the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
KIND, either express or implied. See the License for the specific language governing
permissions and limitations under the License.

This project makes use of ATT&CK®: `ATT&CK Terms of Use
<https://attack.mitre.org/resources/terms-of-use/>`__

0 comments on commit 17bcc8f

Please sign in to comment.