@shellsharks So my team has been thinking of a few ways of mapping controls to TTPs. Best route for now seems to take our Single Process Inventory (SPI) and find correlating controls in place.
Then using MITRE D3FEND, take ATT&CK techniques in our reporting and map to D3FEND techniques that make logical sense for us to implement. Ex. T1134 - Access Token Manipulation has some D3FEND techniques like System Call Analysis, Process Spawn Analysis, Mandatory Access Control.
https://d3fend.mitre.org/offensive-technique/attack/T1134/
NIST 800-53 Rev. 5 also includes a spreadsheet for mapping controls to TTPs although it's kept very vague. They do include a Navigator layer which can be useful to overlay with whatever ATT&CK techniques you're focused on.
https://mitre-engenuity.org/cybersecurity/center-for-threat-informed-defense/our-work/nist-800-53-control-mappings/
#ThreatIntel #MITRE #D3FEND