Skip to content

D3fD3c0y/CTI-Priority-Intelligence-Requirement

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 

Repository files navigation

CTI-Priority-Intelligence-Requirement

Provide examples of Cyber Threat Intelligence (CTI) Priority Intelligence Requirements (PIRs) based on possible Stakeholders

It is under consrtuction ;)

Table of content

 

C-suite level

The following PIRs are typically of strategic interest to C-suite executives, as they align with high-level organizational priorities and decision-making perspectives

PIR TEAM ID PIR FULL NAME DESCRIPTION OBJECTIVE
PIR-CS Data Desc Obj
PIR-CS Data Desc Obj
PIR-CS Data Desc Obj
PIR-CS Data Desc Obj

 

Cyber Threat Intelligence

PIR TEAM ID PIR FULL NAME DESCRIPTION OBJECTIVE
PIR-CTI Data Desc Obj
PIR-CTI Data Desc Obj
PIR-CTI Data Desc Obj
PIR-CTI Data Desc Obj

 

Email Security/Phihshing

PIR TEAM ID PIR FULL NAME DESCRIPTION OBJECTIVE
PIR-PHISH Data Desc Obj
PIR-PHISH Data Desc Obj
PIR-PHISH Data Desc Obj
PIR-PHISH Data Desc Obj

 

External Attack Surface Management

PIR TEAM ID PIR FULL NAME DESCRIPTION OBJECTIVE
PIR-EASM Data Desc Obj
PIR-EASM Data Desc Obj
PIR-EASM Data Desc Obj
PIR-EASM Data Desc Obj

 

GRC

PIR TEAM ID PIR FULL NAME DESCRIPTION OBJECTIVE
PIR-GRC Data Desc Obj
PIR-GRC Data Desc Obj
PIR-GRC Data Desc Obj
PIR-GRC Data Desc Obj

 

Incident Response Management

PIR TEAM ID PIR FULL NAME DESCRIPTION OBJECTIVE
PIR-IRM Data Desc Obj
PIR-IRM Data Desc Obj
PIR-IRM Data Desc Obj
PIR-IRM Data Desc Obj

 

Incident Response

PIR TEAM ID PIR FULL NAME DESCRIPTION OBJECTIVE
PIR-IR Data Desc Obj
PIR-IR Data Desc Obj
PIR-IR Data Desc Obj
PIR-IR Data Desc Obj

 

Insider Threat Team

PIR TEAM ID PIR FULL NAME DESCRIPTION OBJECTIVE
PIR-INSIDER Data Desc Obj
PIR-INSIDER Data Desc Obj
PIR-INSIDER Data Desc Obj
PIR-INSIDER Data Desc Obj

 

Red Team

PIR TEAM ID PIR FULL NAME DESCRIPTION OBJECTIVE
PIR-RED Data Desc Obj
PIR-RED Data Desc Obj
PIR-RED Data Desc Obj
PIR-RED Data Desc Obj

 

Third Party Risk Management

PIR TEAM ID PIR FULL NAME DESCRIPTION OBJECTIVE
PIR-TPRM Data Desc Obj
PIR-TPRM Data Desc Obj
PIR-TPRM Data Desc Obj
PIR-TPRM Data Desc Obj

 

Threat Hunting

PIR TEAM ID PIR FULL NAME DESCRIPTION OBJECTIVE
PIR-TH Data Desc Obj
PIR-TH Data Desc Obj
PIR-TH Data Desc Obj
PIR-TH Data Desc Obj

 

Threat Modeling

PIR TEAM ID PIR FULL NAME DESCRIPTION OBJECTIVE
PIR-ThreatM Data Desc Obj
PIR-ThreatM Data Desc Obj
PIR-ThreatM Data Desc Obj
PIR-ThreatM Data Desc Obj

 

Threat Simulation

PIR TEAM ID PIR FULL NAME DESCRIPTION OBJECTIVE
PIR-ThreatS Data Desc Obj
PIR-ThreatS Data Desc Obj
PIR-ThreatS Data Desc Obj
PIR-ThreatS Data Desc Obj

 

Vulnerability Management

PIR TEAM ID PIR FULL NAME DESCRIPTION OBJECTIVE
PIR-VM PIR-VM-01 - New CISA KEV Be advice when a news vulnerability is added to the CISA KEV (Known Exploited Vulnerability) THe objective is to be made aware of new CISA KEV and then validate if the vulnerability is present on an asset. As the CISA KEV list vulnerability thaht are exploited in the wild, then those should be addressed with a hight priority.
PIR-VM Data Desc Obj
PIR-VM Data Desc Obj
PIR-VM Data Desc Obj

 

About

Provide examples of Cyber Threat Intelligence Priority Intelligence Requirement based on possible Stakeholders

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published