FCRs
As part of any CTI program, it's best for organizations to adopt robust intelligence requirements. Typically developed and leverage in unison, it's best for organizations embarking on a CTI path to leverage, at the very minimum, FCRs, GIRs, PIR, and SIR.
As the need for cyber threat intelligence in an organization evolves and matures, the distinct need for FCRs also arises. Threat intelligence collection is the act of collecting intelligence via a litany of diverse sources, such as open source feeds, telemetry data, and paid-for services, such as VirusTotal.
Generally speaking, what intelligence consumers want and what intelligence is actually collected are two different things. The FCR should prioritize and identify the requestor, and then map the GIR, data inputs, blockers, and desired outputs. When using FCRs, organizations can more easily assign collection tasks to individuals or teams, enabling a manager to easily assign collection tasks based on the priority...