Back

Collect threat intelligence, as necessary.


CONTROL ID
14064
CONTROL TYPE
Process or Activity
CLASSIFICATION
Detective

SUPPORTING AND SUPPORTED CONTROLS




This Control directly supports the implied Control(s):
  • Establish, implement, and maintain a Technical Surveillance Countermeasures program., CC ID: 11401

This Control has the following implementation support Control(s):
  • Identify and document intelligence collection shortfalls., CC ID: 14078


SELECTED AUTHORITY DOCUMENTS COMPLIED WITH




  • Information relating to information security threats should be collected and analysed to produce threat intelligence. (§ 5.7 Control, ISO/IEC 27002:2022, Information security, cybersecurity and privacy protection — Information security controls, Third Edition)
  • A threat intelligence program helps an organization generate their own threat intelligence information and track trends to inform defensive priorities to mitigate risk. (M1019 Threat Intelligence Program, MITRE ATT&CK®, Enterprise Mitigations, Version 13.1)
  • The threat context identifies threat sources, threat events, and threat scenarios of concern for the system of interest. In particular, the threat context helps to identify the characteristics and behaviors of adversaries whose attacks would necessarily undermine the system's ability to execute or s… (3.2.1.4 ¶ 1, NIST SP 800-160, Developing Cyber-Resilient Systems: A Systems Security Engineering Approach, Volume 2, Revision 1)