Under active development Content is continuously updated and improved

3.11.1eThreat Intelligence-Informed Risk Assessment

>Control Description

Employ organization-defined sources of threat intelligence as part of a risk assessment to guide and inform the development of organizational systems, security architectures, selection of security solutions, monitoring, threat hunting, and response and recovery activities.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.