Best Business Documents for Sharing Threat Intelligence | CompTIA CASP+ Exam

Best Business Documents for Sharing Threat Intelligence

Question

Two competing companies experienced similar attacks on their networks from various threat actors.

To improve response times, the companies wish to share some threat intelligence about the sources and methods of attack.

Which of the following business documents would be BEST to document this engagement?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

D.

https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-47.pdf

The BEST business document to document the sharing of threat intelligence between two companies would be a Memorandum of Understanding (MOU).

An MOU is a non-binding agreement between two or more parties that outlines the terms and details of the understanding between them. It is often used to establish a framework for cooperation, communication, and collaboration between organizations, such as in the case of sharing threat intelligence.

An MOU typically covers the purpose of the agreement, the responsibilities of each party, the scope of the agreement, and the terms and conditions of the agreement. It may also include provisions for confidentiality, data sharing, and dispute resolution.

A Business partnership agreement is typically used to establish a formal business relationship between two companies. It would not be the best document to use in this scenario since the two companies are not entering into a formal business partnership.

A Service-level agreement (SLA) is a document that defines the level of service that a service provider will deliver to a customer. It is used in the context of a service provider/customer relationship, and it would not be the best document to use in this scenario since the two companies are not entering into a service provider/customer relationship.

An Interconnection security agreement (ISA) is a document that establishes security requirements for the interconnection of two or more networks. While it may be relevant in the context of sharing threat intelligence, it is not the best document to use in this scenario since it primarily addresses security requirements for network interconnection.