Developing intelligence requirements
Now that you have an understanding of the depth and breadth that intelligence and collection requirements can cover, let's work on developing some to give you a better understanding of how they are created.
Attack surface versus threat actor focused
As you will read later in the book when we discuss conceptual models, the Pyramid of Pain explains the level of threat intelligence that can be obtained and the level of difficulty that is often associated with collection at each phase. At the very bottom of the pyramid, and what is considered simple, easy, and trivial to obtain, are threat indicators. They are also referred to as indicators of compromise (IOCs). They are at the bottom because the base is wide, and this data is often plentiful for collection. From a collection point of view, this is also considered to be attack surface data. The attack surface is usually represented by the digital footprint an organization has connected to...