PIR, SIR, and EEI
Purpose
Define Priority Intelligence Requirements, Specific Intelligence Requirements, and Essential Elements of Information in a CTI workflow.
Practitioner-Level Explanation
PIRs, SIRs, and EEIs convert broad curiosity into answerable intelligence work.
A PIR is the high-level intelligence question tied to a decision. A SIR breaks that question into specific sub-questions. An EEI defines the concrete information needed to answer a SIR.
The distinction matters because analysts often mistake a topic for a requirement. "MuddyWater" is a topic. "Which MuddyWater behaviors reported since 2024 are observable with our endpoint and identity telemetry?" is closer to a PIR.

CTI Relevance
Well-written requirements prevent unfocused collection and make it easier to decide when an output is complete enough. They also help analysts avoid collecting every available article when the actual decision only requires a bounded answer.
Common Mistakes
- Writing PIRs that are too broad to answer.
- Writing SIRs that simply restate the PIR.
- Skipping EEIs and then arguing about evidence after collection.
- Mixing strategic, operational, and technical requirements in one question.
- Forgetting the decision owner.
Practical Workflow
- Identify the decision owner.
- Write the decision that intelligence must support.
- Draft one PIR in question form.
- Break the PIR into three to seven SIRs.
- For each SIR, define EEIs.
- Define required output format and due date.
- Define what would count as a gap.
- Review whether the PIR can lead to action.

Example / Mini Case
Decision:
Should the SOC prioritize a 30-day hunt for remote management tool abuse?
PIR:
Which public CTI reporting since 2024 describes adversary abuse of RMM tools that is relevant to our endpoint estate?
SIR-1:
Which actors or clusters are reported to use RMM tools after phishing or edge compromise?
EEIs:
- Tool names
- Initial access method
- Observed process behavior
- Required telemetry
- Reported sectors or victimology
- Confidence and source reliability
SIR-2:
Can our telemetry observe the behavior?
EEIs:
- Endpoint process logs
- Software inventory
- Network connections
- Identity logs for remote access sessions
- Known administrative RMM baselines
Analyst Checklist
- Does the PIR support a real decision?
- Is the PIR answerable with available or collectable evidence?
- Do SIRs decompose the PIR rather than repeat it?
- Are EEIs concrete enough to drive collection?
- Is the expected output defined?
- Are gaps acceptable and documented?
Output Artifact
PIR ID:
Decision Owner:
Decision Supported:
PIR Question:
SIRs:
EEIs:
Required Sources:
Required Telemetry:
Due Date:
Output Format:
Gap Criteria:
Cross-Links
- Intelligence Cycle
- Source Register Template
- Collection Gap Register
- Hunting Hypothesis Template
- Customer project PIR gate artifacts
- Customer delivery phases and quality gates
- Israel CTI Actor Workbench