Security Operations field mapping Security Operations tables can be mapped to and from other tables, linking a security incident to a customer service case or a problem to other parts of the Security Operations system. For example, you can integrate a plugin to a Security Incident Response task. Field Mapping defines the mapping used when a record from the source table is used to create a new record in the destination table. Typically used to create a security incident from another record, these maps define which fields in a security incident are inserted into a new problem or which fields from an existing customer incident populate a new security incident. Map tables to tables with Security Operations field mappingSecurity Operations provides you with finer field mapping granularity so you can map a Security Operations table to any other table.