7.5.1—7.5.1
>Control Description
The DoD Enterprise works with Components to develop a Cyber Threat Intelligence (CTI) program policy, standard, and process. Components utilize this documentation to develop organizational CTI teams with key mission/task stakeholders. CTI teams gather intelligence from common data feeds across ZT Pillars and aggregate all intelligence to a centralized repository (e.g. SIEM).
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.