Threat Landscape Report Template
Document ID: IR-SOP-018
Version: 1.0
Classification: Internal
Last Updated: 2026-02-15
A quarterly/monthly template for producing threat landscape reports that keep stakeholders informed about the evolving threat environment and how the SOC is adapting. Use this to brief leadership, justify investments, and prioritize defenses.
| Field |
Value |
| Report Period |
[Month/Quarter] [Year] |
| Prepared By |
[SOC Lead / Threat Intel Analyst] |
| Distribution |
[CISO, SOC Team, IT Leadership] |
| Classification |
[Internal / Confidential] |
| Next Report Due |
[Date] |
Executive Summary
Write 3–5 sentences summarizing the most important threat developments this period.
Key Takeaways
| # |
Finding |
Risk Level |
Action Required |
| 1 |
____________ |
🔴/🟠/🟡 |
______ |
| 2 |
____________ |
🔴/🟠/🟡 |
______ |
| 3 |
____________ |
🔴/🟠/🟡 |
______ |
Section 1: Global Threat Landscape
1a. Major Threat Developments
Document 3–5 significant threat developments from the reporting period.
| # |
Development |
Source |
Relevance to Our Org |
| 1 |
____________ |
[CISA/CERT/News] |
🔴 High / 🟡 Medium / 🟢 Low |
| 2 |
____________ |
[CISA/CERT/News] |
🔴 High / 🟡 Medium / 🟢 Low |
| 3 |
____________ |
[CISA/CERT/News] |
🔴 High / 🟡 Medium / 🟢 Low |
1b. Active Threat Actor Groups
| Group / Alias |
Attribution |
Primary Targets |
TTPs |
Relevance |
| __ |
[Nation-state/Criminal/Hacktivist] |
[Sector/Region] |
T__, T____ |
🔴/🟡/🟢 |
| __ |
[Nation-state/Criminal/Hacktivist] |
[Sector/Region] |
T__, T____ |
🔴/🟡/🟢 |
| __ |
[Nation-state/Criminal/Hacktivist] |
[Sector/Region] |
T__, T____ |
🔴/🟡/🟢 |
1c. Industry-Specific Threats
| Threat |
Affected Industries |
Attack Vector |
Our Exposure |
| __ |
__ |
__ |
🔴/🟡/🟢 |
| __ |
__ |
__ |
🔴/🟡/🟢 |
Section 2: Vulnerability Landscape
2a. Critical Vulnerabilities (This Period)
| CVE |
CVSS |
Affected Product |
Exploited in Wild? |
Our Status |
| CVE-_-__ |
__._ |
__ |
✅ Yes / ❌ No |
✅ Patched / ⚠️ In Progress / ❌ Vulnerable |
| CVE-_-__ |
__._ |
__ |
✅ Yes / ❌ No |
✅ Patched / ⚠️ In Progress / ❌ Vulnerable |
| CVE-_-__ |
__._ |
__ |
✅ Yes / ❌ No |
✅ Patched / ⚠️ In Progress / ❌ Vulnerable |
2b. Zero-Day Tracking
| Vendor |
Product |
Discovery Date |
Patch Available? |
Mitigation Applied? |
| __ |
__ |
__ |
✅/❌ |
✅/❌ |
2c. Patch Compliance Summary
| Category |
Total Assets |
Patched (30 days) |
% Compliant |
Gap |
| Servers |
_____ |
_____ |
___% |
__ |
| Workstations |
_____ |
_____ |
___% |
__ |
| Network Devices |
_____ |
_____ |
___% |
__ |
| Cloud Resources |
_____ |
_____ |
___% |
__ |
Section 3: Threat Intelligence from SOC Operations
3a. Threats Detected by SOC
| Category |
Incidents |
Trend |
Top Technique |
Example |
| Phishing |
_____ |
↑/↓ _% |
T1566.___ |
______ |
| Malware |
_____ |
↑/↓ _% |
T1059.___ |
______ |
| Unauthorized Access |
_____ |
↑/↓ _% |
T1110.___ |
______ |
| Cloud Threats |
_____ |
↑/↓ _% |
T1078.___ |
______ |
| Data Exfiltration |
_____ |
↑/↓ _% |
T1567.___ |
______ |
3b. IOC Statistics
| IOC Type |
Total Ingested |
Matched in Logs |
Match Rate |
Actionable |
| IP Addresses |
_____ |
_____ |
___% |
_____ |
| Domains |
_____ |
_____ |
___% |
_____ |
| File Hashes |
_____ |
_____ |
___% |
_____ |
| URLs |
_____ |
_____ |
___% |
_____ |
| Email Addresses |
_____ |
_____ |
___% |
_____ |
3c. TI Feed Effectiveness
| Feed Source |
IOCs Received |
True Matches |
FP Rate |
Value Score |
| __ |
_____ |
_____ |
___% |
★★★★★ |
| __ |
_____ |
_____ |
___% |
★★★★☆ |
| __ |
_____ |
_____ |
___% |
★★★☆☆ |
Section 4: MITRE ATT&CK Analysis
4a. Techniques Observed This Period
graph TD
subgraph "Initial Access"
T1566[T1566 Phishing]
T1190[T1190 Exploit Public App]
end
subgraph "Execution"
T1059[T1059 Command Line]
T1204[T1204 User Execution]
end
subgraph "Persistence"
T1053[T1053 Scheduled Task]
end
subgraph "C2"
T1071[T1071 App Layer Protocol]
end
T1566 --> T1204
T1204 --> T1059
T1059 --> T1053
T1053 --> T1071
Replace with actual observed techniques. Include ATT&CK Navigator heatmap screenshot if available.
4b. Technique Frequency
| MITRE Technique |
Count |
Trend |
Detection Status |
| T1566 Phishing |
_____ |
↑/↓ |
✅ Detected / ⚠️ Partial / ❌ No Rule |
| T1059 Command/Scripting |
_____ |
↑/↓ |
✅ Detected / ⚠️ Partial / ❌ No Rule |
| T1078 Valid Accounts |
_____ |
↑/↓ |
✅ Detected / ⚠️ Partial / ❌ No Rule |
| T1021 Remote Services |
_____ |
↑/↓ |
✅ Detected / ⚠️ Partial / ❌ No Rule |
| __ |
_____ |
↑/↓ |
✅ Detected / ⚠️ Partial / ❌ No Rule |
4c. Detection Gap Analysis
| Tactic |
Techniques NOT Covered |
Risk |
Recommended Action |
| __ |
T__, T____ |
🔴/🟡 |
______ |
| __ |
T__, T____ |
🔴/🟡 |
______ |
Section 5: Regional & Regulatory Threats
5a. Thailand / ASEAN Specific Threats
| Threat |
Target Sector |
Source |
SOC Action |
| __ |
__ |
[ThaiCERT/ASEAN CERT] |
______ |
| __ |
__ |
[ThaiCERT/ASEAN CERT] |
______ |
5b. Regulatory Updates
| Regulation |
Update |
Effective Date |
Impact on SOC |
| PDPA |
______ |
_-_- |
______ |
| BOT Cyber Resilience |
______ |
_-_- |
______ |
| SEC Thailand |
______ |
_-_- |
______ |
| NIST CSF 2.0 |
______ |
_-_- |
______ |
Section 6: Recommendations & Action Items
| # |
Action |
Owner |
Due Date |
Status |
| 1 |
____________ |
__ |
_-_- |
⬜/🔲/✅ |
| 2 |
____________ |
__ |
_-_- |
⬜/🔲/✅ |
| 3 |
____________ |
__ |
_-_- |
⬜/🔲/✅ |
Strategic Recommendations (Next Quarter)
| # |
Recommendation |
Justification |
Estimated Effort |
Priority |
| 1 |
____________ |
______ |
___ person-days |
P_ |
| 2 |
____________ |
______ |
___ person-days |
P_ |
Detection Rule Changes
| Action |
Rule / Technique |
Reason |
| Add |
__ |
New threat observed |
| Tune |
__ |
High FP rate |
| Disable |
__ |
No longer relevant |
Section 7: Threat Forecast
Predict likely threats for the next 30–90 days based on current intelligence.
| # |
Predicted Threat |
Confidence |
Basis |
Preparedness |
| 1 |
____________ |
High/Med/Low |
______ |
✅ Ready / ⚠️ Partial / ❌ Not Ready |
| 2 |
____________ |
High/Med/Low |
______ |
✅ Ready / ⚠️ Partial / ❌ Not Ready |
| 3 |
____________ |
High/Med/Low |
______ |
✅ Ready / ⚠️ Partial / ❌ Not Ready |
Intelligence Sources
| Source |
Type |
Frequency |
URL/Access |
| CISA Alerts |
Government |
Real-time |
https://www.cisa.gov/known-exploited-vulnerabilities |
| ThaiCERT |
Government/Regional |
Weekly |
https://www.thaicert.or.th |
| MITRE ATT&CK |
Framework |
Quarterly |
https://attack.mitre.org |
| AlienVault OTX |
Community |
Real-time |
https://otx.alienvault.com |
| VirusTotal |
Commercial |
Real-time |
https://www.virustotal.com |
| Abuse.ch |
Community |
Real-time |
https://abuse.ch |
| [Vendor TI Feed] |
Commercial |
______ |
__ |