ID.RA-02.153
Has your organization configured cybersecurity tools to automatically ingest and operationalize threat intelligence feeds?
Explanation
This question assesses whether your security tools (like SIEM, EDR, firewalls, etc.) are set up to automatically consume and act upon external threat intelligence. Properly configured threat intelligence integration enables your security systems to detect and respond to known threats based on indicators of compromise (IoCs), malicious IP addresses, domains, or file hashes that are identified by the broader security community. Evidence could include screenshots of configured threat intelligence feeds in security tools, documentation of integration configurations, or reports showing alerts/blocks triggered by threat intelligence data.
Implementation Example
Configure cybersecurity tools and technologies with detection or response capabilities to securely ingest cyber threat intelligence feeds
ID: ID.RA-02.153
Context
- Function
- ID: IDENTIFY
- Category
- ID.RA: Risk Assessment
- Sub-Category
- Cyber threat intelligence is received from information sharing forums and sources

