Under active development Content is continuously updated and improved · Last updated Feb 18, 2026, 2:55 AM UTC

3.11.1eThreat Intelligence-Informed Risk Assessment

>Control Description

Employ organization-defined sources of threat intelligence as part of a risk assessment to guide and inform the development of organizational systems, security architectures, selection of security solutions, monitoring, threat hunting, and response and recovery activities.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.