DE.AE-07:
Cyber threat intelligence and other contextual information are integrated into the analysis
Implementation Examples
Ex1:
Securely provide cyber threat intelligence feeds to detection technologies, processes, and personnel
Ex2:
Securely provide information from asset inventories to detection technologies, processes, and personnel
Ex3:
Rapidly acquire and analyze vulnerability disclosures for the organization's technologies from suppliers, vendors, and third-party security advisories