ID.RA-02.154
Does your organization have a process to receive and review cybersecurity threat intelligence from reputable third-party sources?
Explanation
This question assesses whether your organization actively monitors external threat intelligence to stay informed about current threat actors and their tactics, techniques, and procedures (TTPs). Regular review of security advisories helps organizations anticipate potential threats, understand emerging attack vectors, and proactively adjust security controls to address specific risks before they are exploited. Evidence of fulfillment could include documentation of subscribed threat intelligence feeds (e.g., US-CERT, CISA, industry ISACs), meeting minutes from threat intelligence review sessions, or screenshots of a threat intelligence platform showing recent advisories with annotations on their relevance to your environment.
Implementation Example
Receive and review advisories from reputable third parties on current threat actors and their tactics, techniques, and procedures (TTPs)
ID: ID.RA-02.154
Context
- Function
- ID: IDENTIFY
- Category
- ID.RA: Risk Assessment
- Sub-Category
- Cyber threat intelligence is received from information sharing forums and sources

