Strategy & Ambition
Legal & Compliance
IT Infrastructure X-Ray
Risk & Opportunities
Improvements
Security Policies & Procedures
Measures & Controls
Operations
Leadership & Management
ISO Certification
Progress Overview
Real Time Audit
Audit View
Threat Intelligence
This Wiki Page can be used as a Cheat Sheet during security meetings. Or Create your own Template Checklist in Compleye Online.
The Threat Analysis Checklist:
Define Threat | Name your threat |
Source of Threat | How did you get aware of it? Where is it coming from? |
Impact/Challenge | Describe high-level the impact it might/will have and the challenge ahead. |
X-ray Components | How many components are affected by this threat? |
Risk (Low, Medium, High) | We suggest using the same Risk Profile as your ISRA. (SEE BELOW) |
Suggested new preventive measure | Describe high-level measures to be taken. |
Classify chosen solution: | Classify your Measure: a. Strategic: Focus on high-level information about the threat landscape by understanding high level trends and adversarial motives and then leveraging this information when making security and business decisions. b. Tactical: Focus on intelligence on tools, techniques, and attack methodologies by conducting malware analysis and improvements. c. Operational: Focus on intelligence on specific attacks and indicators by understanding, adversarial, capabilities, infrastructure and then leveraging this information to conduct more targeted and prioritized cybersecurity operations |
Assign a Control or Improvement | How do you want to create evidence, keep in control of your measure? Improvements are one-time activities to improve the ISMS System. Controls will be added to section Operational Planning & Control as a recurring event to monitor or check. Make sure that you select an additional control type ’threat intelligence’ next to ‘ISO 27001-Security’. And for improvement Origin ’threat intelligence’. |
In Compleye Online you can upload the Template Threat Intelligence Assessment. Content in this wiki page is included in the template, together with the Threat Intelligence Lifecycle.
0 out of 5 stars
5 Stars | 0% | |
4 Stars | 0% | |
3 Stars | 0% | |
2 Stars | 0% | |
1 Stars | 0% |