a. Detection Metrics
b. Response Metrics
c. Adversary Simulation Metrics
3. Mapping Metrics to Frameworks
Use standardized taxonomies to contextualize metrics:
| Framework | Use |
|---|---|
| MITRE ATT&CK | Track and categorize techniques used/detected |
| D3FEND | Map detection and mitigation controls to attack stages |
| TIBER-EU Purple Teaming | Apply metrics to cooperative testing phases and risk validation |
| DORA Compliance | Provide evidence of capability improvement and incident detection timelines |
Map red team findings to widely adopted security frameworks for structured remediation:
| Framework | Operational Mapping |
|---|---|
| NIST 800-53 / CSF | Align findings with control families: AC (Access Control), AU (Audit & Accountability), IR (Incident Response), etc. |
| ISO 27001 | Feed into continuous improvement and risk treatment plans. |
| CIS Controls v8 | Identify missed safeguards (e.g., Control 8 – Audit Log Management, Control 13 – Network Monitoring). |
| MITRE D3FEND | Suggest technical detection and prevention mechanisms for specific attack techniques. |