Free ebook: NIS2 ready using ISO 27001 best practices
Download ebook

The goals of threat intelligence and the collection of information related to information security threats

Critical
High
Normal
Low

Organization carries out threat intelligence by gathering information about information security threats related to its operations and how to protect against them. The goal is to increase awareness of the threat environment, so that own security level can be better evaluated and adequate control measures implemented.

When collecting threat intelligence, all three levels must be taken into account:

  • strategic threat intelligence (e.g. information on the growing types of attackers and attacks)
  • tactical threat intelligence (e.g. information about tools and technologies used in attacks)
  • operational threat intelligence (e.g. details of specific attacks)

Principles related to threat intelligence should include:

  • setting targets for threat intelligence
  • identification, verification and selection of information sources used in threat intelligence
  • gathering threat intelligence
  • data processing for analysis (e.g. translation, formatting, compression)
Connected other frameworks and requirements:
5.7: Threat intelligence
ISO 27001

Regular analysis and utilization of information related to information security threats

Critical
High
Normal
Low

Organization carries out threat intelligence by analyzing and utilizing collected information about relevant cyber security threats related and corresponding protections.

When analyzing and utilizing the collected threat intelligence information, the following points must be taken into account:

  • analyzing how the threat intelligence information relates to to our own operations
  • analyzing how relevant threat intelligence information is to our operations
  • communicating and sharing information in an understandable form to relevant persons
  • utilizing the findings of threat intelligence to determine the adequacy of technical protections, technologies used and information security testing methods for analysis
Connected other frameworks and requirements:
5.7: Threat intelligence
ISO 27001
2.2 (MIL1): Respond to Threats and Share Threat Information
C2M2

Sharing threat intelligence

Critical
High
Normal
Low

Organization should share threat intelligence information actively with other organizations to improve its own threat awareness.

Connected other frameworks and requirements:
5.7: Threat intelligence
ISO 27001
2.2 (MIL1): Respond to Threats and Share Threat Information
C2M2

Consideration of threat intelligence findings in the information security risk management process

Critical
High
Normal
Low

Organization must consider the threat intelligence process findings in the information security risk management process. Threat intelligence can detect, for example, the proliferation of certain types of attacks or the development of new technologies, based on which assessments of certain information security risks must be updated, which may lead to the need to reduce risks through treatment plans.

Connected other frameworks and requirements:
5.7: Threat intelligence
ISO 27001
No items found.