From 96d9f566cb2f7fef97981d9dc734eda7831acd89 Mon Sep 17 00:00:00 2001 From: Ivy Oeltjenbruns <38511035+blackwidow0616@users.noreply.github.com> Date: Wed, 14 Feb 2024 14:16:50 -0600 Subject: [PATCH] Remove Appendix A --- docs/dimensions.rst | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/dimensions.rst b/docs/dimensions.rst index aecf073..351e464 100644 --- a/docs/dimensions.rst +++ b/docs/dimensions.rst @@ -3,7 +3,7 @@ Three Dimensions of Threat-Informed Defense How can an organization implement or improve their Threat-Informed Defense? The starting point depends on the degree to which the organization currently incorporates cyber threat information. Any organization can apply threat information to their cybersecurity approach. At a minimum, the organization can take the perspective of an adversary and think about what an adversary might do to disrupt their business through cyber. Thinking this way helps to identify priorities in security and leads to a series of questions such as: What adversaries are known to target my industry or even my company? What are these adversaries capable of? How well is my organization currently prepared to mitigate, detect, or resiliently operate despite a malicious cyber-attack by such adversaries? What should my organization do next to be better prepared? The three dimensions of Threat-Informed Defense described below help organizations determine where they are in this process and recommended practices for improving. -The goal of this project is to help any organization begin to incorporate threat in their security program. This white paper provides both the understanding of *what* is Threat-Informed Defense as well as *why* Threat-Informed Defense is valuable. In addition, the best practices included in this paper provide a basis to measure the current state of leveraging threat-informed approaches in a security program, as well as how to improve a security program by implementing threat-informed best practices. In the sections that follow, the three main Dimensions of Threat-Informed Defense will be explained, as well as their key components. These components are discussed in more detail in Appendix A, along with key best practices for each component. +The goal of this project is to help any organization begin to incorporate threat in their security program. This white paper provides both the understanding of *what* is Threat-Informed Defense as well as *why* Threat-Informed Defense is valuable. In addition, the best practices included in this paper provide a basis to measure the current state of leveraging threat-informed approaches in a security program, as well as how to improve a security program by implementing threat-informed best practices. In the sections that follow, the three main Dimensions of Threat-Informed Defense will be explained, as well as their key components. These components are discussed in more detail on the Key Components and Maturity Levels page, along with key best practices for each component. The Center has historically described Threat-Informed Defense as a continuous process in which defenders and adversaries are constantly learning and evolving. To implement an effective Threat-Informed Defense, an organization must understand the threat and implement effective defensive measures. To understand the efficacy of existing or planned defensive measures and identify defensive gaps, an organization must evaluate their current posture, as well as potential new defensive measures, against the known threats. From a Defense perspective, this process takes place in three main Dimensions: @@ -21,7 +21,7 @@ An effective Threat-Informed Defense must continuously learn and evolve to optim CTID Threat-Informed Defense Cycle -In the sections that follow, the three main Dimensions of TID will be explained, as well as their key components. These components are discussed in more detail in Appendix A, along with key best practices for each component. +In the sections that follow, the three main Dimensions of TID will be explained, as well as their key components. These components are discussed in more detail on the Key Components and Maturity Levels page, along with key best practices for each component. Cyber Threat Intelligence - Know the Adversary ----------------------------------------------