DE.AE-07:

Cyber threat intelligence and other contextual information are integrated into the analysis

Implementation Examples

Ex1:

Securely provide cyber threat intelligence feeds to detection technologies, processes, and personnel

Ex2:

Securely provide information from asset inventories to detection technologies, processes, and personnel

Ex3:

Rapidly acquire and analyze vulnerability disclosures for the organization's technologies from suppliers, vendors, and third-party security advisories