This Story will identify the threat actors and controls that are most closely aligned with your chosen sector. It will then create a Sublime Security Rule from the information gathered in Analyst1. Finally, all the Sublime Security rules will be uploaded as evidence to Drata.
How it works
Import this story to your tenant, from where you can adapt it to meet your unique needs.
Import