RS.CO-03.334
Does your organization voluntarily share information about observed threat actor tactics, techniques, and procedures (TTPs) with an Information Sharing and Analysis Center (ISAC) or similar industry group after removing sensitive data?
Explanation
Sharing sanitized threat intelligence about attacker TTPs helps strengthen the collective security posture of your industry by allowing other organizations to prepare defenses against similar attacks. This collaborative approach enables faster identification of emerging threats and more effective response strategies across the sector. Evidence of fulfillment could include documentation of ISAC membership, logs or records of information shared (with sensitive data removed), internal policies governing threat intelligence sharing, or correspondence with ISAC representatives confirming your organization's participation in information sharing activities.
Implementation Example
Voluntarily share information about an attacker's observed TTPs, with all sensitive data removed, with an Information Sharing and Analysis Center (ISAC)
ID: RS.CO-03.334
Context
- Function
- RS: RESPOND
- Category
- RS.CO: Incident Response Reporting and Communication
- Sub-Category
- Information is shared with designated internal and external stakeholders

