Blog

The Intelligence Cycle in Cyber Security: Six Phases, MITRE ATT&CK, and Implementation

Cybersecurity analyst reviewing threat intelligence cycle on laptop in bright modern office representing intelligence cycle cyber security direction collection analysis phases

The intelligence cycle is the structured process through which raw data — threat feeds, OSINT, dark web monitoring, network telemetry — gets transformed into actionable intelligence that security teams can use to make decisions, prioritize defenses, and respond to specific adversary threats. The cycle’s application in cybersecurity directly mirrors the six-phase model used by national intelligence agencies (Direction, Collection, Processing, Analysis, Dissemination, Feedback), adapted for the operational tempo of enterprise security operations centers where the time between threat emergence and required response can be measured in hours rather than weeks. The threat intelligence market reflects the scale of enterprise investment in this process: MarketsandMarkets projects growth from $11.55 billion in 2025 to $22.97 billion by 2030 at a 14.7% CAGR, driven by expanding attack surfaces, growing compliance requirements, and the operational failure mode that drives most CTI investment — security teams flooded with unprocessed threat data that never becomes intelligence their teams can act on. IBM’s 2026 X-Force Threat Intelligence Index documents why the intelligence cycle matters practically: active ransomware groups surged 49% in 2025 (109 distinct groups, up from 73 in 2024), and organizations that convert threat intelligence into specific defensive actions — blocking specific TTPs, hunting for Diamond Model-identified infrastructure, hardening attack paths that MITRE ATT&CK shows are relevant to their sector — measurably outperform organizations that consume threat data passively. The intelligence cycle, applied correctly, is the operational framework that converts the passive consumption of threat intelligence into the active, targeted security posture that the current threat environment demands.

  • Intelligence cycle: 6 phases — Direction, Collection, Processing, Analysis, Dissemination, Feedback — adapted from national intelligence models for enterprise CTI operations
  • Threat intelligence market: $11.55B (2025) → $22.97B (2030), 14.7% CAGR — driven by enterprise demand for actionable CTI programs beyond passive data consumption
  • IBM X-Force 2026: active ransomware groups surged 49% in 2025 (109 groups vs. 73 in 2024) — intelligence cycle directs defensive resources toward the right threat actors
  • MITRE ATT&CK: behavioral TTP-based framework enabling intelligence cycle integration from collection through dissemination — 14 tactics, 200+ techniques, continuously updated
  • Diamond Model: adversary-capability-infrastructure-victim framework for intrusion analysis; Cisco Talos 2025 extended it with a 5th Relationship Layer for multi-actor RaaS campaigns

The Intelligence Cycle in Cyber Security: Six Phases from Direction to Feedback

Security professional working at laptop in bright modern workspace representing intelligence cycle cyber security six phases direction collection processing analysis dissemination feedback

Direction and Collection: Defining Requirements and Building Intelligence Sources

The intelligence cycle begins with Direction — the phase that most threat intelligence programs skip or execute poorly, which is why they fail to produce actionable outputs despite collecting vast volumes of data. Direction requires defining Priority Intelligence Requirements (PIRs): specific questions the intelligence program is designed to answer, tied to the assets most at risk, the threat actors most likely to target the organization’s sector, and the decisions security leadership needs intelligence to inform. Without explicit PIRs, collection becomes arbitrary — threat feeds and OSINT data accumulate without a framework for determining what’s relevant to the organization’s specific threat exposure. Collection, the second phase, builds the visibility required to answer the PIRs: internal network telemetry and SIEM data provide first-party signals; commercial threat intelligence feeds (Recorded Future, Flashpoint, Mandiant, CrowdStrike) provide curated external intelligence; OSINT collection from open sources, dark web monitoring, paste sites, and hacker forums provides direct adversary perspective; and government sharing through ISACs and CISA provides sector-specific threat data that organizations can’t collect independently. The critical discipline in Collection is aligning sources to PIRs rather than maximizing data volume — organizations that collect everything without purpose produce the same failure mode as organizations that collect nothing, because neither approach produces targeted intelligence. The Cyber Threat Intelligence (CTI) research community broadly endorses primary source collection — direct monitoring of threat actor environments — as producing higher-fidelity intelligence than reliance on vendor-processed feeds alone, because vendor processing introduces latency and potential loss of context between raw adversary activity and the finished intelligence product the organization receives.

Processing, Analysis, and Dissemination: From Raw Data to Actionable Intelligence

Processing is the phase that transforms collected data into a format suitable for analysis: deduplication of redundant indicators, normalization of data formats (converting proprietary formats to STIX — Structured Threat Information Expression — the JSON-based standard for expressing CTI entities including Indicators, Malware, Campaigns, and Intrusion Sets), enrichment with context (associating IP addresses with known threat actor infrastructure, linking hashes to malware families, mapping domains to campaigns), and prioritization against current PIRs. TAXII (Trusted Automated eXchange of Intelligence Information) — the REST API transport protocol that moves STIX data between organizations and platforms — enables automated processing at the scale that modern security operations require, allowing threat intelligence platforms to ingest, process, and distribute structured CTI without manual analyst intervention for each indicator. Analysis is where raw processed data becomes intelligence: the human-driven phase where analysts apply structured analytical techniques, the Diamond Model framework (mapping intrusions across four interconnected features — adversary, capability, infrastructure, and victim), the Cyber Kill Chain (positioning the attack in its lifecycle from reconnaissance through actions on objectives), and MITRE ATT&CK (mapping adversary TTPs to the taxonomy of 14 tactics and 200+ techniques derived from real-world attack observations) to produce assessments with explicit confidence levels and recommended actions. The 2025 Cisco Talos extended Diamond Model adds a fifth Relationship Layer specifically to model multi-actor campaigns — particularly relevant for ransomware-as-a-service ecosystems where the initial access broker, ransomware operator, and extortion team may be distinct groups whose coordination the original four-feature model couldn’t represent cleanly. Dissemination closes the production cycle: intelligence products delivered in formats and at frequencies appropriate to their audiences — tactical indicators for SIEM/SOAR automated blocking, operational campaign reports for SOC teams, strategic threat landscape briefings for CISO and board-level risk decisions. The feedback phase makes the cycle self-correcting: structured input from intelligence consumers on whether products were timely, relevant, and actionable drives PIR refinement and source quality assessment. Recorded Future’s threat intelligence lifecycle framework provides the practitioner-level detail on each phase’s operational requirements and the common failure modes that reduce intelligence programs to expensive data collection exercises without analysis output.

Implementing the Intelligence Cycle: Tools, Frameworks, and Enterprise Challenges

Security team working at computers in bright modern office representing intelligence cycle cyber security implementation STIX TAXII threat intelligence platforms MITRE ATT&CK

Threat Intelligence Platforms, MITRE ATT&CK Integration, and Common Implementation Failures

Implementing the intelligence cycle operationally requires three categories of tooling that work together to move data through the six phases. Threat Intelligence Platforms (TIPs) — including Anomali ThreatStream, ThreatConnect, MISP (Malware Information Sharing Platform, the open-source option), and IBM X-Force Exchange — provide the Collection and Processing infrastructure: ingesting feeds in STIX/TAXII format, deduplicating and enriching indicators, and distributing finished intelligence to downstream security tools. SIEM platforms (Splunk, Microsoft Sentinel, Elastic SIEM) provide the integration point between threat intelligence and detection: STIX indicators distributed via TAXII feed directly into detection rules, enabling the intelligence cycle’s Analysis phase output to automatically update defensive coverage without manual analyst configuration. MITRE ATT&CK provides the analytical taxonomy that makes the cycle coherent: by mapping collected threat intelligence to specific ATT&CK techniques, analysts can determine whether the organization’s detection coverage addresses the techniques known threat actors use against the sector — and identify gaps where collection needs to expand or defenses need to be added. The most common implementation failure is that most organizations run a truncated cycle — Collection and Processing without structured Direction or feedback — producing what practitioners call “indicator feeds” rather than intelligence programs. The MarketsandMarkets projection that the threat intelligence market will reach $22.97 billion by 2030 reflects substantial investment in TIP tooling and data feeds, but platform investment without the analytical discipline of properly executed Direction and Analysis phases produces organizations that are better-informed about threats in the abstract without converting that information into specific defensive actions. The intelligence cycle, properly implemented, is distinguished from passive threat data consumption by one operational discipline: every collection source, every processing step, and every disseminated product traces back to a specific PIR that connects to a specific business risk decision — which is what separates intelligence programs that improve security posture from threat intelligence subscriptions that generate report volume without changing what defenders actually detect or prevent. MITRE ATT&CK’s CTI training resources provide the analytical methodology for integrating ATT&CK into each phase of the intelligence cycle, from collection planning that targets TTP-level data to dissemination products that map adversary behavior to organizational detection gaps.

Frequently Asked Questions

What is the intelligence cycle in cyber security?

The intelligence cycle in cyber security is the six-phase process — Direction, Collection, Processing, Analysis, Dissemination, and Feedback — through which raw threat data is transformed into actionable intelligence security teams use to make decisions. Direction defines Priority Intelligence Requirements (PIRs) tied to specific business risks. Collection builds visibility through feeds, OSINT, dark web monitoring, and ISACs. Processing normalizes data into structured formats (STIX/TAXII). Analysis applies frameworks including MITRE ATT&CK, the Diamond Model, and the Cyber Kill Chain to produce assessments with confidence levels. Dissemination delivers intelligence products to the right audiences (tactical indicators to SIEM, operational reports to SOC, strategic briefings to CISO). Feedback refines PIRs and source quality. The cycle’s value is the operational discipline it imposes: without Direction and Feedback, most intelligence programs collapse into expensive data collection that doesn’t inform specific security decisions.

What are the six phases of the intelligence cycle?

The six phases of the intelligence cycle: Direction — defining intelligence requirements and linking them to specific business risk decisions; Collection — gathering data from internal telemetry, commercial feeds, OSINT, dark web monitoring, and government sharing (ISACs, CISA); Processing — normalizing, deduplicating, enriching, and structuring data (STIX format) for analysis; Analysis — applying structured analytical techniques, Diamond Model, Kill Chain, and MITRE ATT&CK to produce assessments with confidence levels and recommended actions; Dissemination — delivering intelligence products in formats appropriate to each audience (tactical/operational/strategic); Feedback — gathering stakeholder input on timeliness, relevance, and actionability to refine requirements and sources. The cycle is iterative: feedback directly informs Direction, making the process self-correcting as the threat environment and organizational risk profile evolve.

How does MITRE ATT&CK fit into the intelligence cycle?

MITRE ATT&CK integrates into the intelligence cycle at multiple phases: Direction — ATT&CK helps define PIRs by identifying which techniques known threat actors use against the organization’s sector, focusing collection on TTP-relevant data rather than generic indicators; Collection — ATT&CK technique IDs provide a standardized taxonomy for labeling collected data, enabling comparison across sources; Analysis — ATT&CK maps collected intelligence to specific tactics and techniques, enabling gap analysis (which techniques do threat actors use that current defenses don’t detect?); Dissemination — ATT&CK-formatted reports allow direct translation of intelligence into detection engineering tasks. The ATT&CK framework distinguishes TTP-level intelligence (behavioral, harder to change) from IOC-level intelligence (indicators like IPs/domains/hashes, trivial for attackers to change), which is why TTP-focused collection using ATT&CK as the analytical lens produces longer-lasting defensive value than indicator-only intelligence programs.

What is the Diamond Model in cyber threat intelligence?

The Diamond Model is an intrusion analysis framework that maps every attack as four interconnected features: Adversary (the threat actor or group responsible), Capability (the tools, malware, and techniques used), Infrastructure (the servers, domains, and communication channels), and Victim (the targeted organization, system, or individual). The model’s analytical value: changing one feature creates a chain reaction that reveals additional intelligence — identifying a shared infrastructure node links multiple intrusions to the same adversary even when capabilities differ; identifying shared malware families across incidents reveals campaigns even when infrastructure rotates. Cisco Talos extended the Diamond Model in 2025 with a fifth Relationship Layer to model multi-actor campaigns in ransomware-as-a-service ecosystems, where initial access brokers, ransomware operators, and extortion teams operate as distinct entities whose coordination the original four-feature model couldn’t represent cleanly. The Diamond Model is most valuable in the Analysis phase of the intelligence cycle, complementing MITRE ATT&CK (behavioral techniques) and the Kill Chain (attack lifecycle positioning).