Summary
In this chapter, we gave a high-level overview of CTI and how it can help us focus on cyber threats that matters to us. We also understood the overall CTI process and saw some concrete applications for specific use cases.
Then, we defined how CTI can inform purple teaming exercises. We also discussed how different variations of CTI can exist depending on our organizations' security context, resources, and maturity. We then saw how TIPs should be leveraged by organizations to ease the collection of threat data.
Now that we've seen the input, the next chapter will cover the output of purple teaming. Indeed, we will see how different types of security controls should be considered, managed, and addressed to enhance our security posture.