Threats

The Threats page in CyberGuard.ai serves as a centralized repository for identifying, categorizing, and managing cybersecurity threats that may impact organizational assets, domains, or perimeters. It provides a structured way to document known and potential threats, along with their associated sources, providers, and domains. This catalog acts as the foundation for threat modeling, risk assessment, and control alignment activities across the platform.

Administrators can record each threat with details such as reference ID, name, description, provider, domain, and labels. This standardized view enables organizations to maintain visibility into their evolving threat landscape and ensures that mitigation actions can be tied back to recognized frameworks and controls.


Usage Notes

  1. Adding a New Threat

    • Click the Add Threat button to define a new threat record.

    • Provide details including the threat name, description, provider (e.g., MITRE, ENISA), and associated domain.

    • Optionally tag the threat with labels for classification (e.g., “Phishing,” “Ransomware,” “Insider Threat”).

  2. Viewing and Editing Threats

    • Use the view icon to see detailed information about a specific threat, including linked risks, controls, and mitigations.

    • Use the edit option to update threat attributes as intelligence or classifications evolve.

  3. Filtering and Searching

    • Use the search bar to quickly locate threats by name, label, or provider.

    • The filter panel enables refined searches for specific domains or threat categories.

  4. Integration with Risk Assessments

    • Recorded threats are automatically referenced in the Risk Management module during the identification and assessment process.

    • This integration helps maintain traceability between threats, associated vulnerabilities, and applied controls.


  • Reference Controls – Define and link mitigating controls to identified threats.

  • Risk Matrices – Evaluate how recorded threats influence risk levels and scoring criteria.

  • Mappings – Understand how threats connect to frameworks, controls, and policies.

  • Assets Management – Identify which assets are affected by specific threats to prioritize mitigation.

Last updated