The following is a basic example of how the intelligence cycle and F3EAD can be integrated.
Scenario:
RonV corporation started as a family business in Antarctica in 2018 and has transitioned into an organization with worldwide operations in the widget making industry. Due to increased concerns of cyber attacks, RonV is trying to centralize security services so that headquarters can monitor the security posture of the organization. Over the years, mergers and acquisitions increased the complexity of the IT architecture with each additional business. Following the CIS Critical Security Controls, the CIO of the company has already begun maturing the capability to inventory authorized hardware and software, as well as have a ...