CRA-5.8.13A
(a) Cyber threat entities including cyber criminals, cyber activists, insider threats;
(b) Methodologies and attack vectors across various technologies including cloud, email, websites, third parties, physical access, or others as relevant;
(c) Changes in the frequency, variety, and severity of cyber threats relevant to the region;
(d) Dark web surveillance to identify any plot for cyber attacks;
(e) Examples of cyber threats from past cyber-attacks on the licensee where applicable; and
(f) Examples of cyber threats from recent cyber-attacks on other organisations.
Added: April 2023