diff --git a/docs/security-assessment-mapping.md b/docs/security-assessment-mapping.md index 55e3aa8..bd52596 100644 --- a/docs/security-assessment-mapping.md +++ b/docs/security-assessment-mapping.md @@ -5,7 +5,7 @@ To assist in these broader security assessment capabilities, BloodHound queries This approach enables different security teams to leverage BloodHound's comprehensive attack path data for multiple kinds of risk validation, whether they're conducting red team assessments, blue team analysis, or compliance audits. -The BloodHound-centric mapping data is available at [security-assessment-mapping.json](/docs/security-assessmet-mapping.json) +The BloodHound-centric mapping data is available at [security-assessment-mapping.json](/docs/security-assessment-mapping.json) ## Assessment Coverage Overview