Threat Management

Mechanisms exist to implement a threat intelligence program that includes a cross-organization information-sharing capability that can influence the development of the system and security architectures, selection of security solutions, monitoring, threat hunting, response and recovery activities.


Login

Threat Management

Mechanisms exist to develop Indicators of Exposure (IOE) to understand the potential attack vectors that attackers could use to attack the organization.


Login

Threat Management

Mechanisms exist to maintain situational awareness of evolving threats by leveraging the knowledge of attacker tactics, techniques and procedures to facilitate the implementation of preventative and compensating controls.


Login

Threat Management

Mechanisms exist to implement an insider threat program that includes a cross-discipline insider threat incident handling team.


Login

Threat Management

Mechanisms exist to utilize security awareness training on recognizing and reporting potential indicators of insider threat.


Login

Threat Management

Mechanisms exist to establish a Vulnerability Disclosure Program (VDP) to assist with the secure development and maintenance of products and services that receives unsolicited input from the public about vulnerabilities in organizational systems, services and processes.


Login

Threat Management

Level N/A

Mechanisms exist to perform cyber threat hunting that uses Indicators of Compromise (IoC) to detect, track and disrupt threats that evade existing security controls.


Login

Threat Management

Level N/A

Mechanisms exist to embed false data or steganographic data in files to enable the organization to determine if data has been exfiltrated and provide a means to identify the individual(s) involved.


Login

Threat Management

Level N/A

Mechanisms exist to develop and keep current a catalog of applicable internal and external threats to the organization, both natural and manmade.


Login

Threat Management

Level N/A

Mechanisms exist to identify, assess, prioritize and document the potential impact(s) and likelihood(s) of applicable internal and external threats.


Login