Xcavate Team Docs
Ctrlk
  • Introduction
  • Policies & SOPs
  • Linear Integration: Automated Issue Routing System
  • Risk & Compliance
    • Introduction
    • Governance and Compliance Structure
    • Risk Categories and Mitigation Measures
    • Risk Management Framework
    • Compliance Framework
    • Threat and Vulnerability Management (TVM)
      • Purpose
      • Standards and Guidance Alignment
      • Scope
      • TVM Lifecycle Overview
        • Asset Identification and Classification (CSF: ID.AM)
        • Threat Intelligence Integration (CSF: ID.RA-2)
        • Vulnerability Detection and Assessment (SP 800-40r4 / SP 800-53 RA-5)
        • Risk Analysis and Prioritisation (SP 800-30r1)
        • Patch and Remediation Management (SP 800-40r4)
        • Penetration Testing and Technical Security Assessments (SP 800-115)
        • Reporting and Communication
        • Metrics and Monitoring
      • Required Documentation & Templates
      • Regulatory and FCA Compliance Mapping
      • Continuous Improvement
    • Incident Management
    • Monitoring and Auditing
    • Employee Training and Awareness
    • Continuous Improvement
    • Conclusion
    • Appendix A: Glossary of Key Terms
    • Appendix B: Risk Register (Template)
    • Appendix C: TVM Risk Register Template
    • Appendix D: Incident (Template)
    • Appendix E: Compliance Checklists (Templates)
    • Appendix F: Control and Compliance Mappings
  • Security
  • Testing
  • Audits
Powered by GitBook
On this page
  1. Risk & Compliance
  2. Threat and Vulnerability Management (TVM)
  3. TVM Lifecycle Overview

Threat Intelligence Integration (CSF: ID.RA-2)

  • Subscribe to vetted threat feeds (e.g., CISA, NCSC, FS-ISAC, vendor threat bulletins).

  • Correlate emerging threats with Xcavate's environment and services.

References:

CSF: ID.RA-2 https://csf.tools/reference/nist-cybersecurity-framework/v1-1/id/id-ra/id-ra-2/

CISA https://www.cisa.gov/

NCSC https://www.ncsc.gov.uk/collection/building-a-security-operations-centre/threat-intelligence; https://www.ncsc.gov.uk/files/An-introduction-to-threat-intelligence.pdf

FS-ISAC https://www.fsisac.com/insights/tag/threat-intelligence

PreviousAsset Identification and Classification (CSF: ID.AM)NextVulnerability Detection and Assessment (SP 800-40r4 / SP 800-53 RA-5)

Last updated 6 months ago