
ID.RA-3: Risk Assessment
Threats, both internal and external, are identified and documented.

ID.RA-2: Risk Assessment
Cyber threat intelligence is received from information sharing forums and sources.
Threats, both internal and external, are identified and documented.
Cyber threat intelligence is received from information sharing forums and sources.