DE.AE-03.296

Does your organization actively use cyber threat intelligence to correlate events across multiple log sources?

Explanation

This question assesses whether your organization leverages external or internal threat intelligence data to identify patterns, anomalies, and potential security incidents by correlating information across different log sources (such as firewall logs, IDS/IPS alerts, authentication logs, and endpoint security logs). Effective correlation helps security teams detect sophisticated attacks that might not be apparent when examining individual log sources in isolation.As evidence, you could provide documentation of your SIEM (Security Information and Event Management) implementation showing threat intelligence feeds integration, screenshots of correlation rules that incorporate threat intelligence data, or reports/dashboards demonstrating how events from multiple sources are correlated based on threat intelligence indicators.

Implementation Example

Utilize cyber threat intelligence to help correlate events among log sources

ID: DE.AE-03.296

Context

Function
DE: DETECT
Category
DE.AE: Adverse Event Analysis
Sub-Category
Information is correlated from multiple sources

ResponseHub is the product I wish I had when I was a CTO

Previously I was co-founder and CTO of Progression, a VC backed HR-tech startup used by some of the biggest names in tech.

As our sales grew, security questionnaires quickly became one of my biggest pain-points. They were confusing, hard to delegate and arrived like London busses - 3 at a time!

I'm building ResponseHub so that other teams don't have to go through this. Leave the security questionnaires to us so you can get back to closing deals, shipping product and building your team.

Signature
Neil Cameron
Founder, ResponseHub
Neil Cameron