DE.AE-03.296
Does your organization actively use cyber threat intelligence to correlate events across multiple log sources?
Explanation
This question assesses whether your organization leverages external or internal threat intelligence data to identify patterns, anomalies, and potential security incidents by correlating information across different log sources (such as firewall logs, IDS/IPS alerts, authentication logs, and endpoint security logs). Effective correlation helps security teams detect sophisticated attacks that might not be apparent when examining individual log sources in isolation.As evidence, you could provide documentation of your SIEM (Security Information and Event Management) implementation showing threat intelligence feeds integration, screenshots of correlation rules that incorporate threat intelligence data, or reports/dashboards demonstrating how events from multiple sources are correlated based on threat intelligence indicators.
Implementation Example
Utilize cyber threat intelligence to help correlate events among log sources
ID: DE.AE-03.296
Context
- Function
- DE: DETECT
- Category
- DE.AE: Adverse Event Analysis
- Sub-Category
- Information is correlated from multiple sources

