ID.RA-03:
Internal and external threats to the organization are identified and recorded
Implementation Examples
Ex1:
Use cyber threat intelligence to maintain awareness of the types of threat actors likely to target the organization and the TTPs they are likely to use
Ex2:
Perform threat hunting to look for signs of threat actors within the environment
Ex3:
Implement processes for identifying internal threat actors