Introduction to MISP
Abstract:
Cybersecurity Incident Response teams want to: Have a way to receive (trusted) data from other teams; Ideally reduce duplication during analysis; Move toward automated solutions where possible and appropriate; Restrict access to certain data according to policy/practices.
Security Markings
DOCUMENT & CONTEXTUAL SUMMARY
Distribution Code:
A - Approved For Public Release
Distribution Statement: Public Release
RECORD
Collection: TRECMS