Under active development Content is continuously updated and improved

6.7.16.7.1

>Control Description

DoD Enterprise works with Components to establish cybersecurity incident response guidance using industry best practices, such as NIST and a list of approved threat data sources as specified in "Cyber Threat Intelligence Program Pt 1". DoD Components enable workflows for security events using internal context, past threat events, and other threat intelligence. Approved external sources of enrichment are identified for future integration. These workflows are used to determine incident response procedures.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.