Skip to content

Threat Landscape Report Template

Document ID: IR-SOP-018 Version: 1.0 Classification: Internal Last Updated: 2026-02-15

A quarterly/monthly template for producing threat landscape reports that keep stakeholders informed about the evolving threat environment and how the SOC is adapting. Use this to brief leadership, justify investments, and prioritize defenses.


Report Metadata

Field Value
Report Period [Month/Quarter] [Year]
Prepared By [SOC Lead / Threat Intel Analyst]
Distribution [CISO, SOC Team, IT Leadership]
Classification [Internal / Confidential]
Next Report Due [Date]

Executive Summary

Write 3–5 sentences summarizing the most important threat developments this period.




Key Takeaways

# Finding Risk Level Action Required
1 ____________ 🔴/🟠/🟡 ______
2 ____________ 🔴/🟠/🟡 ______
3 ____________ 🔴/🟠/🟡 ______

Section 1: Global Threat Landscape

1a. Major Threat Developments

Document 3–5 significant threat developments from the reporting period.

# Development Source Relevance to Our Org
1 ____________ [CISA/CERT/News] 🔴 High / 🟡 Medium / 🟢 Low
2 ____________ [CISA/CERT/News] 🔴 High / 🟡 Medium / 🟢 Low
3 ____________ [CISA/CERT/News] 🔴 High / 🟡 Medium / 🟢 Low

1b. Active Threat Actor Groups

Group / Alias Attribution Primary Targets TTPs Relevance
__ [Nation-state/Criminal/Hacktivist] [Sector/Region] T__, T____ 🔴/🟡/🟢
__ [Nation-state/Criminal/Hacktivist] [Sector/Region] T__, T____ 🔴/🟡/🟢
__ [Nation-state/Criminal/Hacktivist] [Sector/Region] T__, T____ 🔴/🟡/🟢

1c. Industry-Specific Threats

Threat Affected Industries Attack Vector Our Exposure
__ __ __ 🔴/🟡/🟢
__ __ __ 🔴/🟡/🟢

Section 2: Vulnerability Landscape

2a. Critical Vulnerabilities (This Period)

CVE CVSS Affected Product Exploited in Wild? Our Status
CVE-_-__ __._ __ ✅ Yes / ❌ No ✅ Patched / ⚠️ In Progress / ❌ Vulnerable
CVE-_-__ __._ __ ✅ Yes / ❌ No ✅ Patched / ⚠️ In Progress / ❌ Vulnerable
CVE-_-__ __._ __ ✅ Yes / ❌ No ✅ Patched / ⚠️ In Progress / ❌ Vulnerable

2b. Zero-Day Tracking

Vendor Product Discovery Date Patch Available? Mitigation Applied?
__ __ __ ✅/❌ ✅/❌

2c. Patch Compliance Summary

Category Total Assets Patched (30 days) % Compliant Gap
Servers _____ _____ ___% __
Workstations _____ _____ ___% __
Network Devices _____ _____ ___% __
Cloud Resources _____ _____ ___% __

Section 3: Threat Intelligence from SOC Operations

3a. Threats Detected by SOC

Category Incidents Trend Top Technique Example
Phishing _____ ↑/↓ _% T1566.___ ______
Malware _____ ↑/↓ _% T1059.___ ______
Unauthorized Access _____ ↑/↓ _% T1110.___ ______
Cloud Threats _____ ↑/↓ _% T1078.___ ______
Data Exfiltration _____ ↑/↓ _% T1567.___ ______

3b. IOC Statistics

IOC Type Total Ingested Matched in Logs Match Rate Actionable
IP Addresses _____ _____ ___% _____
Domains _____ _____ ___% _____
File Hashes _____ _____ ___% _____
URLs _____ _____ ___% _____
Email Addresses _____ _____ ___% _____

3c. TI Feed Effectiveness

Feed Source IOCs Received True Matches FP Rate Value Score
__ _____ _____ ___% ★★★★★
__ _____ _____ ___% ★★★★☆
__ _____ _____ ___% ★★★☆☆

Section 4: MITRE ATT&CK Analysis

4a. Techniques Observed This Period

graph TD
    subgraph "Initial Access"
        T1566[T1566 Phishing]
        T1190[T1190 Exploit Public App]
    end
    subgraph "Execution"
        T1059[T1059 Command Line]
        T1204[T1204 User Execution]
    end
    subgraph "Persistence"
        T1053[T1053 Scheduled Task]
    end
    subgraph "C2"
        T1071[T1071 App Layer Protocol]
    end

    T1566 --> T1204
    T1204 --> T1059
    T1059 --> T1053
    T1053 --> T1071

Replace with actual observed techniques. Include ATT&CK Navigator heatmap screenshot if available.

4b. Technique Frequency

MITRE Technique Count Trend Detection Status
T1566 Phishing _____ ↑/↓ ✅ Detected / ⚠️ Partial / ❌ No Rule
T1059 Command/Scripting _____ ↑/↓ ✅ Detected / ⚠️ Partial / ❌ No Rule
T1078 Valid Accounts _____ ↑/↓ ✅ Detected / ⚠️ Partial / ❌ No Rule
T1021 Remote Services _____ ↑/↓ ✅ Detected / ⚠️ Partial / ❌ No Rule
__ _____ ↑/↓ ✅ Detected / ⚠️ Partial / ❌ No Rule

4c. Detection Gap Analysis

Tactic Techniques NOT Covered Risk Recommended Action
__ T__, T____ 🔴/🟡 ______
__ T__, T____ 🔴/🟡 ______

Section 5: Regional & Regulatory Threats

5a. Thailand / ASEAN Specific Threats

Threat Target Sector Source SOC Action
__ __ [ThaiCERT/ASEAN CERT] ______
__ __ [ThaiCERT/ASEAN CERT] ______

5b. Regulatory Updates

Regulation Update Effective Date Impact on SOC
PDPA ______ _-_- ______
BOT Cyber Resilience ______ _-_- ______
SEC Thailand ______ _-_- ______
NIST CSF 2.0 ______ _-_- ______

Section 6: Recommendations & Action Items

Immediate Actions (This Month)

# Action Owner Due Date Status
1 ____________ __ _-_- ⬜/🔲/✅
2 ____________ __ _-_- ⬜/🔲/✅
3 ____________ __ _-_- ⬜/🔲/✅

Strategic Recommendations (Next Quarter)

# Recommendation Justification Estimated Effort Priority
1 ____________ ______ ___ person-days P_
2 ____________ ______ ___ person-days P_

Detection Rule Changes

Action Rule / Technique Reason
Add __ New threat observed
Tune __ High FP rate
Disable __ No longer relevant

Section 7: Threat Forecast

Predict likely threats for the next 30–90 days based on current intelligence.

# Predicted Threat Confidence Basis Preparedness
1 ____________ High/Med/Low ______ ✅ Ready / ⚠️ Partial / ❌ Not Ready
2 ____________ High/Med/Low ______ ✅ Ready / ⚠️ Partial / ❌ Not Ready
3 ____________ High/Med/Low ______ ✅ Ready / ⚠️ Partial / ❌ Not Ready

Intelligence Sources

Source Type Frequency URL/Access
CISA Alerts Government Real-time https://www.cisa.gov/known-exploited-vulnerabilities
ThaiCERT Government/Regional Weekly https://www.thaicert.or.th
MITRE ATT&CK Framework Quarterly https://attack.mitre.org
AlienVault OTX Community Real-time https://otx.alienvault.com
VirusTotal Commercial Real-time https://www.virustotal.com
Abuse.ch Community Real-time https://abuse.ch
[Vendor TI Feed] Commercial ______ __