AWS attack techniques mapped to detection rules.
Technique → Detection
How attack techniques map to detection signals.