Free ebook: NIS2 ready using ISO 27001 best practices
Download ebook

Regular analysis and utilization of information related to information security threats

Critical
High
Normal
Low

Organization carries out threat intelligence by analyzing and utilizing collected information about relevant cyber security threats related and corresponding protections.

When analyzing and utilizing the collected threat intelligence information, the following points must be taken into account:

  • analyzing how the threat intelligence information relates to to our own operations
  • analyzing how relevant threat intelligence information is to our operations
  • communicating and sharing information in an understandable form to relevant persons
  • utilizing the findings of threat intelligence to determine the adequacy of technical protections, technologies used and information security testing methods for analysis
Connected other frameworks and requirements:
5.7: Threat intelligence
ISO 27001
2.2 (MIL1): Respond to Threats and Share Threat Information
C2M2

Sharing threat intelligence

Critical
High
Normal
Low

Organization should share threat intelligence information actively with other organizations to improve its own threat awareness.

Connected other frameworks and requirements:
5.7: Threat intelligence
ISO 27001
2.2 (MIL1): Respond to Threats and Share Threat Information
C2M2
No items found.