← CRA Glossary
CVD & Vulnerability Management

Threat Intelligence

Threat intelligence is evidence-based information about existing or emerging cybersecurity threats — including attacker TTPs, indicators of compromise, and exploitation trends — that enables organisations to make informed decisions about their security posture. For CRA manufacturers, threat intelligence feeds the threat modelling and active exploitation monitoring processes.

Threat intelligence is evidence-based information about existing or emerging cybersecurity threats — including attacker TTPs, indicators of compromise, and exploitation trends — that enables organisations to make informed decisions about their security posture. For CRA manufacturers, threat intelligence feeds the threat modelling and active exploitation monitoring processes.

CVD & Vulnerability Management

What Is Threat Intelligence?

Threat intelligence is structured, contextualised information about the cybersecurity threat landscape — who is attacking, what methods they use, which vulnerabilities they exploit, and which types of targets they focus on. It is distinguished from raw data (logs, alerts) by being processed, analysed, and made actionable. Threat intelligence is typically categorised by level: strategic intelligence (high-level trends for executive decision-making), operational intelligence (specific campaigns and attacker behaviours for security operations), and tactical intelligence (indicators of compromise, malware signatures, and exploit signatures for technical response teams). For product manufacturers, threat intelligence primarily supports threat modelling during development and exploitation monitoring during the operational phase.

CRA reference:Annex I

Threat Intelligence in CRA Compliance

The CRA's Annex I requires manufacturers to address cybersecurity risks through risk assessments and threat modelling. Threat intelligence is a critical input to these processes: it grounds theoretical threat models in real-world attacker behaviour rather than abstract risk categories. Key CRA-relevant uses of threat intelligence include:

  • Threat modelling: Using intelligence about attacker TTPs relevant to the product category (e.g., known attack patterns against IoT devices or industrial controllers) to inform the product's security design.
  • Active exploitation monitoring: Subscribing to intelligence feeds that notify manufacturers when vulnerabilities in their product's component stack are being exploited — feeding the CRA Article 14 notification trigger.
  • SBOM vulnerability prioritisation: Using exploitation frequency data (EPSS) and active exploit intelligence (CISA KEV) to prioritise which SBOM-correlated CVEs require immediate remediation.
CRA reference:Annex I

Key Threat Intelligence Sources for Manufacturers

Manufacturers should monitor multiple intelligence sources based on their product categories and technology stack:

  • CISA KEV: The US Cybersecurity and Infrastructure Security Agency's Known Exploited Vulnerabilities catalogue — the most authoritative public source of confirmed active exploitation.
  • ENISA threat landscape reports: Annual and sector-specific reports on the EU threat landscape, with relevance to CRA-covered product categories.
  • National CSIRT advisories: Real-time alerts from EU member state CSIRTs on active threats and exploited vulnerabilities.
  • FIRST EPSS: Exploit prediction scores for prioritising patching based on exploitation likelihood.
  • MITRE ATT&CK: A structured knowledge base of adversary tactics and techniques relevant to threat modelling.
  • Vendor intelligence feeds: Threat intelligence from security vendors with relevant product coverage (e.g., OT/ICS threat intelligence for industrial product manufacturers).
CRA reference:Annex I

Integrating Threat Intelligence into PSIRT Operations

A PSIRT operating under CRA obligations should have defined processes for consuming and acting on threat intelligence. Recommended practices:

  • Feed subscription and triage: Subscribe to relevant intelligence feeds and have a defined process for converting intelligence alerts into vulnerability triage actions.
  • CVE correlation against SBOM: Automate the matching of newly published CVEs (particularly those with active exploitation indicators) against the SBOM to identify which internal products are affected.
  • Intelligence-driven severity adjustment: Use threat intelligence to upgrade severity assessments beyond CVSS base score when active exploitation or attacker focus on a specific technology stack is identified.
  • Intelligence sharing: Participate in sector ISACs and share threat intelligence with peers and national CSIRTs — the CRA encourages information sharing within the ecosystem.

CVD Portal makes Threat Intelligence compliance straightforward.

Public CVD submission portal, acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation. Free forever for EU manufacturers.

Start your free portal

Frequently asked

Do CRA manufacturers need to subscribe to paid threat intelligence feeds?+

The CRA does not require paid threat intelligence subscriptions. However, manufacturers of higher-risk products (Important Class I and II) should ensure their threat intelligence sources are comprehensive enough to support credible risk assessments and exploitation monitoring. Free sources (CISA KEV, ENISA reports, national CSIRT feeds, FIRST EPSS) provide a solid baseline. For manufacturers with complex product portfolios or in sectors with sophisticated threat actors (critical infrastructure, industrial, medical), supplementing with paid feeds from specialist vendors is advisable.

How does threat intelligence differ from vulnerability intelligence?+

Vulnerability intelligence focuses specifically on information about security flaws in software and hardware — CVEs, CVSS scores, exploitation status. Threat intelligence is broader, encompassing attacker identities, motivations, tactics, techniques, and procedures (TTPs). In practice, the two overlap significantly: exploitation data from CISA KEV is both vulnerability intelligence (this CVE is being exploited) and threat intelligence (these attackers are using this CVE to attack these targets). For CRA purposes, both types are relevant and manufacturers should consume both.

Is sharing threat intelligence with competitors allowed under EU competition law?+

Sharing cybersecurity threat intelligence — including indicators of compromise and exploitation data — is generally exempt from EU competition law concerns when it focuses on defensive information sharing rather than commercial coordination. The EU's NIS2 Directive actively encourages sector-level information sharing through ISACs. The CRA similarly supports ecosystem-level security information exchange. Manufacturers should participate in sector ISACs and information sharing platforms without concern, provided the shared information is strictly limited to security matters and does not include commercially sensitive data.

Related terms

Threat ModelingThreat modeling is a structured technique for identifying, prioritising, and mitigating security threats to a system during its design phase by systematically analysing what could go wrong, who might cause it, and what the impact would be. It is the foundational practice that enables manufacturers to meet the CRA's requirement for risk-informed, secure-by-design product development.Indicator of Compromise (IoC)An Indicator of Compromise (IoC) is a piece of forensic evidence — such as a malicious IP address, file hash, domain name, or registry key — that suggests a system has been compromised. IoCs are used in incident response and threat intelligence to detect and investigate security incidents, including the exploitation of product vulnerabilities.CISA Known Exploited Vulnerabilities (KEV) CatalogueThe CISA Known Exploited Vulnerabilities (KEV) catalogue is a curated list maintained by the US Cybersecurity and Infrastructure Security Agency that identifies CVEs for which there is credible evidence of active exploitation in the wild. For EU manufacturers, the KEV catalogue is the highest-priority vulnerability intelligence source — any KEV entry affecting a shipped product triggers the CRA's 24-hour ENISA notification obligation.Exploit Prediction Scoring System (EPSS)The Exploit Prediction Scoring System (EPSS) is a data-driven model maintained by FIRST that estimates the probability that a given CVE will be exploited in the wild within the next 30 days. EPSS complements CVSS by adding exploitation likelihood to severity, enabling more effective vulnerability prioritisation.

Browse the full CRA Compliance Checklist

See how Threat Intelligence fits into your complete CRA compliance programme.

View checklists →