ID.RA-02:

Cyber threat intelligence is received from information sharing forums and sources

Implementation Examples

Ex1: 

Configure cybersecurity tools and technologies with detection or response capabilities to securely ingest cyber threat intelligence feeds

Ex2: 

Receive and review advisories from reputable third parties on current threat actors and their tactics, techniques, and procedures (TTPs)

Ex3: 

Monitor sources of cyber threat intelligence for information on the types of vulnerabilities that emerging technologies may have