Threat intelligence overview - Threat Intel Series Part-1
TLDR: Threat intelligence is on way to becoming a must-have capability for every organization. This will not only help protect the firm but also keep them aware of constant threats and the plan to safeguard against those.
Threat intelligence overview:
As defined by Gartner, threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications, and actionable advice, about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject's response to that menace or hazard.
This curated information helps a firm to make better decisions about how to defend ourselves and our business, from cyber-based threats.
Threat intelligence can help identify and analyze different cyber threats relevant to your organization
The best approach is to use specialized threat intelligence tools to capture and digest feeds and thereafter analyze them via existing knowledge to know if a threat is real and the applicable actions to address that.
Threat intelligence helps us identify:
- Who are my adversaries and how might they attack me?
- How do attack vectors affect the security of my company?
- What should my security operations teams be watching for?
- How to reduce the risk of a cyber attack against my company?
1. Tactical threat intelligence
The most commonly used threat intelligence shows common indicators of compromise (IOCs). These are used for machine-to-machine detection of threats and for incident responders to search for specific artifacts in a firm’s network.
2. Operational threat intelligence
Provides intel on threat methodologies to expose potential risks. It provided enhanced detection and incident response to uncover completely new threats.
Leveraged on tools focused on threat groups (utilities, backdoor families, common infrastructure)
Tactics, Techniques, and Procedures (TTP) for specific threat groups (staging directories, file naming conventions, ports, protocols, favorite file types)
Emerging TTP (new persistence methods, exploits, phishing schemes)
3. Strategic threat intelligence
This helps identify historical trends, motivations, or attributions as to who is behind an attack. This provides a starting point for determining defensive measures for maximum effectiveness.
- Attribution for intrusions and data breaches
- Threat group trends
- Targeting trends for industry sectors and geographies
- Mapping cyber-attacks to events
- Global statistics on breaches, malware, and information theft
- Major attacker TTP updates over time
Threat intelligence lifecycle
A threat intelligence lifecycle typically includes the below phases:
1. Planning and Direction/ Requirements
2. Collection
3. Processing
4. Analysis
5. Dissemination
6. Feedback
More coming up in part-2!
Awesome blog. I enjoyed reading your articles. This is truly a great read for me. I have bookmarked it and I am looking forward to reading new articles.
ReplyDeleteNFFI