Security Visibility Visualizations
Interactive visualizations to understand security coverage and detection capabilities
Threat Visibility Heatmap
Visualize coverage effectiveness by log source and threat category
Coverage Legend
Strong Coverage
Moderate Coverage
Limited Coverage
| Log Source | Initial Access | Execution | Persistence | Privilege Escalation | Defensive Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command Control | Exfiltration | Impact |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Network Devices | 3 | 1 | 1 | 1 | 2 | 1 | 2 | 3 | 1 | 3 | 3 | 2 |
| Endpoint Security | 2 | 3 | 3 | 3 | 3 | 3 | 3 | 2 | 3 | 2 | 2 | 3 |
| Identity & Access | 2 | 1 | 2 | 3 | 2 | 3 | 2 | 2 | 1 | 1 | 1 | 1 |
| Cloud Infrastructure | 2 | 2 | 2 | 3 | 2 | 2 | 2 | 1 | 2 | 1 | 2 | 2 |
| Email Security | 3 | 2 | 1 | 1 | 2 | 2 | 1 | 1 | 1 | 2 | 2 | 1 |
| Packet Inspection | 2 | 2 | 1 | 1 | 2 | 2 | 2 | 2 | 1 | 3 | 3 | 1 |
| Operating System | 2 | 3 | 3 | 3 | 3 | 3 | 3 | 2 | 2 | 1 | 1 | 3 |
| Application Logs | 2 | 2 | 2 | 2 | 2 | 3 | 2 | 1 | 3 | 1 | 2 | 2 |
| SaaS Applications | 2 | 1 | 2 | 2 | 1 | 2 | 2 | 1 | 3 | 1 | 3 | 2 |
| DNS Infrastructure | 1 | 1 | 1 | 1 | 1 | 1 | 2 | 1 | 1 | 3 | 2 | 1 |
This heatmap visualizes the effectiveness of different log sources in providing visibility into various threat categories based on the MITRE ATT&CK framework.