implementing-threat-intelligence-lifecycle-management

Installation
SKILL.md

Implementing Threat Intelligence Lifecycle Management

Overview

The threat intelligence lifecycle is a structured, iterative process for transforming raw data into actionable intelligence. Based on the intelligence cycle used by military and government agencies, it comprises six phases: Direction (requirements gathering), Collection (data acquisition), Processing (normalization and deduplication), Analysis (contextualization and assessment), Dissemination (distribution to stakeholders), and Feedback (evaluation and refinement). This skill covers building each phase with tooling, metrics, and integration points for a mature CTI program.

When to Use

  • When deploying or configuring implementing threat intelligence lifecycle management capabilities in your environment
  • When establishing security controls aligned to compliance requirements
  • When building or improving security architecture for this domain
  • When conducting security assessments that require this implementation

Prerequisites

  • Python 3.9+ with pymisp, stix2, requests, pandas libraries
  • MISP or OpenCTI as threat intelligence platform
  • Ticketing system (Jira, ServiceNow) for requirements management
  • SIEM integration (Splunk, Elastic) for indicator operationalization
Related skills
Installs
11
GitHub Stars
6.2K
First Seen
Mar 15, 2026