ID.RA-03:

Internal and external threats to the organization are identified and recorded

Implementation Examples

Ex1: 

Use cyber threat intelligence to maintain awareness of the types of threat actors likely to target the organization and the TTPs they are likely to use

Ex2: 

Perform threat hunting to look for signs of threat actors within the environment

Ex3: 

Implement processes for identifying internal threat actors