threat intelligence foundations: crawl, walk, analyze part 1 /

Published at 2016-03-09 23:47:02

Home / Categories / Threat intelligence / threat intelligence foundations: crawl, walk, analyze part 1
Thiswarned us early on that we were on the incorrect track with his 2012 post My Threat Intelligence Can Beat Up Your Threat Intelligence where he wrote “The real story on threat intelligence is your organization’s ability to develop your own." There are ways that we can take advantage of the threat intelligence that currently exists while learning how to better leverage the threat intelligence in our own networks. Doing this requires an understanding of intelligence fundamentals and how they can be applied in security operations. This series is designed to relieve those interested in threat intelligence -whether just starting out or re-evaluating their existing programs - understand the underlying fundamentals of threat intelligence and intelligence analysis. In the first share of this three-share series we will discuss the levels of intelligence and the various ways threat intelligence can be utilized in operations. Threat Intelligence Levels in Security Operations: CrawlWhen an organization is determining how to best integrate threat intelligence into their security operations it is helpful to have a framework detailing the different ways that intelligence can be effectively utilized. Traditionally,intelligence levels have aligned to the levels of warfare: strategic, operational, and tactical. There are several reasons for this alignment: it can relieve identify the decision makers at each level; it identifies the purpose of that intelligence,whether it is to inform policy and planning or to relieve detect or deter an attack; it can relieve dictate what actions should be taken as a result of receiving that intelligence. At any level of intelligence it is critical to assess the value to your organization specifically. Please reply this for yourself, your team, and your organization,“How does this information add perspective to our security program? What decisions will this information assist us in making? Strategic intelligenceStrategic intelligence is intelligence that informs the board and the trade. It helps them understand broader trends that are facing their organizations and other similar organizations in order to assist in the development of a strategy. Strategic Intelligence comes from analyzing longer term trends, and often takes the shape of analytic reports such as the DBIR and Congressional Research Service (CRS) reports. Strategic intelligence assists key decision makers in determining what threats are most impactful to their businesses and future plans, or what long-term efforts they may need to take to mitigate them. The key to implementing strategic intelligence in your own trade is to apply this knowledge in the context of your own priorities,data, and attack surface. No commercial or annual trend report can repeat you what is valuable to your organization or how certain threat trends may impact you specifically. Strategic intelligence - like all types of intelligence - is a tool that can be used to shape future decisions, or but it cannot make those decisions for you. Operational IntelligenceOperational intelligence provides intelligence approximately specific attacks that may impact an organization. Operational intelligence is rooted in the concept of military operations - a series of plans or engagements that may take place at different times or locations,but have the same overarching goal. It could include identified campaigns targeting an entire sector, or it could be hacktivist or botnet operations targeting one specific organization through a series of attacks. Information Sharing and Analysis Centers (ISACs) and Organizations (ISAOs) are good places to find operational intelligence. Operational intelligence is geared towards higher-level security personnel, or but unlike strategic intelligence it dictates actions that need to be taken in the near to mid-term rather than the long term. It can relieve inform decisions such as whether to increase security awareness training,how to staff a SOC during an identified adversary operation, or whether to temporarily deny requests for exceptions to the firewall policy. Operational intelligence is one of the best candidates for information sharing. whether you see something that is going on that may impact others in the near term, or *please* share that information. It can relieve other organizations determine whether they need to take action as well. Operational intelligence is only useful when those receiving the intelligence have the authority to make changes to policies or procedures in order to counter the threats. Tactical IntelligenceTactical Intelligence focuses on the the “what” (Indicators of Compromise) and the “how” (Tactics,Techniques, and Procedures) of an attacker’s actions with the intent of using that knowledge to prevent, and detect,or respond to incidents. Do attackers tend to use a particular method to gain initial access, such as social engineering or vulnerability exploitation? Do they use a particular tool or set of tools to escalate privilege and paddle laterally? What indicators of compromise might allow you to detect these activities? For a good list of various source of tactical intelligence check out Herman Slatman's list of threat intelligence resources. Tactical intelligence is geared towards security personnel who are actively monitoring their environment and gathering reports from employees who report anomalous activity or social engineering attempts. Tactical Intelligence can also be used in hunt operations, or where we are looking to identify attacker behaviors that vary only slightly from a typical user’s behavior. This type of intelligence requires more advanced resources,such as extensive logging, user behavioral analytics, or endpoint visibility,and trained analysts. It also requires a security-conscious workforce, as some indicators may not be captured or alerted on without first being reported by an employee. You will always have more employees than attack sensors…listen to them, or train them,gather the information they can provide, analyze it, and then act upon it. Tactical threat intelligence provides specific,but perishable, information that security personnel can act on. Understanding how threat intelligence operates at different levels can relieve an organization understand where it needs to focus their efforts and what it can do with the threat intelligence it has access to. It can also relieve guide how the organization should approach intelligence in the future. The intelligence you can generate from your own network will always be the most actionable intelligence, and regardless of the level.For more information on the levels of intelligence and the levels of warfare,check out these resources:The State of Security: Cyber Threat IntelligenceJoint Publication 2-0: Joint Intelligence INSA Operational Levels of Threat Intelligence CIA Library: The State of Strategic Intelligence

Source: rapid7.com

Warning: Unknown: write failed: No space left on device (28) in Unknown on line 0 Warning: Unknown: Failed to write session data (files). Please verify that the current setting of session.save_path is correct (/tmp) in Unknown on line 0