Skip to content

Commit

Permalink
Update minor language
Browse files Browse the repository at this point in the history
  • Loading branch information
blackwidow0616 authored Mar 15, 2024
1 parent 27d7704 commit 0779197
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion docs/dimensions.rst
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ Three Dimensions of Threat-Informed Defense

How can an organization implement or improve their Threat-Informed Defense? The starting point depends on the degree to which the organization currently incorporates cyber threat information. Any organization can apply threat information to their cybersecurity approach. At a minimum, the organization can take the perspective of an adversary and think about what an adversary might do to disrupt their business through cyber. Thinking this way helps to identify priorities in security and leads to a series of questions such as: What adversaries are known to target my industry or even my company? What are these adversaries capable of? How well is my organization currently prepared to mitigate, detect, or resiliently operate despite a malicious cyber-attack by such adversaries? What should my organization do next to be better prepared? The three dimensions of Threat-Informed Defense described below help organizations determine where they are in this process and recommended practices for improving.

The goal of this project is to help any organization begin to incorporate threat in their security program. This white paper provides both the understanding of *what* is Threat-Informed Defense as well as *why* Threat-Informed Defense is valuable. In addition, the best practices included in this paper provide a basis to measure the current state of leveraging threat-informed approaches in a security program, as well as how to improve a security program by implementing threat-informed best practices. In the sections that follow, the three main Dimensions of Threat-Informed Defense will be explained, as well as their key components. These components are discussed in more detail on the Key Components and Maturity Levels page, along with key best practices for each component.
The goal of this project is to help any organization begin to incorporate threat in their security program. This paper provides both the understanding of *what* is Threat-Informed Defense as well as *why* Threat-Informed Defense is valuable. In addition, the best practices included in this paper provide a basis to measure the current state of leveraging threat-informed approaches in a security program, as well as how to improve a security program by implementing threat-informed best practices. In the sections that follow, the three main Dimensions of Threat-Informed Defense will be explained, as well as their key components. These components are discussed in more detail on the Key Components and Maturity Levels page, along with key best practices for each component.

The Center has historically described Threat-Informed Defense as a continuous process in which defenders and adversaries are constantly learning and evolving. To implement an effective Threat-Informed Defense, an organization must understand the threat and implement effective defensive measures. To understand the efficacy of existing or planned defensive measures and identify defensive gaps, an organization must evaluate their current posture, as well as potential new defensive measures, against the known threats. From a Defense perspective, this process takes place in three main Dimensions:

Expand Down

0 comments on commit 0779197

Please sign in to comment.