SI-5: Security Alerts, Advisories, and Directives

From NIST's SP800-53:

a. Receive system security alerts, advisories, and directives from [Assignment: organization-defined external organizations] on an ongoing basis; b. Generate internal security alerts, advisories, and directives as deemed necessary; c. Disseminate security alerts, advisories, and directives to: [Selection (one or more): [Assignment: organization-defined personnel or roles]; [Assignment: organization-defined elements within the organization]; [Assignment: organization-defined external organizations]]; and d. Implement security directives in accordance with established time frames, or notify the issuing organization of the degree of noncompliance.

Cyber Threat Graph Context

Explore how this control relates to the wider threat graph

SP800-53 Control Mapped to NIST Cyber Security Framework

Generated from NISTs SP800-53/CSF Crosswalk mappings.

Control ID Description
ID.RA-1 Asset vulnerabilities are identified and documented
RS.AN-5 Processes are established to receive, analyze and respond to vulnerabilities disclosed to the organization from internal and external sources (e.g. internal testing, security bulletins, or security researchers)
ID.RA-3 Threats, both internal and external, are identified and documented
ID.RA-2 Cyber threat intelligence is received from information sharing forums and sources
RS.CO-5 Voluntary information sharing occurs with external stakeholders to achieve broader cybersecurity situational awareness

MITRE ATT&CK Techniques

See which MITRE ATT&CK techniques this control helps to protect against.

ATT&CK ID Title Associated Tactics
T1210 Exploitation of Remote Services Lateral Movement
T1068 Exploitation for Privilege Escalation Privilege Escalation
T1212 Exploitation for Credential Access Credential Access
T1211 Exploitation for Defense Evasion Defense Evasion