Skip to content

Commit ff5cae4

Browse files
authored
Merge pull request #220083 from limwainstein/removing-crown-jewels-reference
Removing crown jewels reference
2 parents 1cb8469 + 0a99f1e commit ff5cae4

File tree

2 files changed

+1
-1
lines changed

2 files changed

+1
-1
lines changed
114 KB
Loading

articles/sentinel/migration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ Before you begin migration, identify key use cases, detection rules, data, and a
8585
When planning the discover phase, use the following guidance to identify your use cases.
8686
- Identify and analyze your current use cases by threat, operating system, product, and so on.
8787
- What’s the scope? Do you want to migrate all use cases, or use some prioritization criteria?
88-
- Conduct a [Crown Jewel Analysis](https://www.mitre.org/research/technology-transfer/technology-licensing/crown-jewels-analysis).
88+
- Identify which security assets are most critical to your migration.
8989
- What use cases are effective? A good starting place is to look at which detections have produced results within the last year (false positive versus positive rate).
9090
- What are the business priorities that affect use case migration? What are the biggest risks to your business? What type of issues put your business most at risk?
9191
- Prioritize by use case characteristics.

0 commit comments

Comments
 (0)