Skip to main content

💼 ID.RA-02: Cyber threat intelligence is received from information sharing forums and sources

  • ID: /frameworks/nist-csf-v2.0/id-ra/02

Description​

  1. Configure cybersecurity tools and technologies with detection or response capabilities to securely ingest cyber threat intelligence feeds
  2. Receive and review advisories from reputable third parties on current threat actors and their tactics, techniques, and procedures (TTPs)
  3. Monitor sources of cyber threat intelligence for information on the types of vulnerabilities that emerging technologies may have

Similar​

  • Sections
    • /frameworks/nist-csf-v1.1/id-ra/02
    • /frameworks/nist-sp-800-53-r5/si/05
    • /frameworks/nist-sp-800-53-r5/pm/15
    • /frameworks/nist-sp-800-53-r5/pm/16

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 NIST CSF v1.1 → 💼 ID.RA-2: Cyber threat intelligence is received from information sharing forums and sourcesno data
💼 NIST SP 800-53 Revision 5 → 💼 PM-15 Security and Privacy Groups and Associationsno data
💼 NIST SP 800-53 Revision 5 → 💼 PM-16 Threat Awareness Program1no data
💼 NIST SP 800-53 Revision 5 → 💼 SI-5 Security Alerts, Advisories, and Directives1no data

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance