Cyber Threat Intelligence¶
This section outlines the components that have been identified for the CTI dimension as well as the levels within the components. These components and levels form the basis for assessing how threat informed an organization’s CTI program is.
Depth of Threat Intelligence¶
What level of information (roughly relative to the Pyramid of Pain) is being used to track adversaries?
Ephemeral IOCs: hashes, IPs, domains: data sources an adversary can change easily
Tools used by adversaries which can be swapped or modified by an adversary to evade detection
Techniques and Tactics used by adversaries which are harder to change
Low-variance adversary behaviors and associated observables which are very difficult to change
Breadth of Threat Intelligence¶
Relative to the depth component, roughly how many ATT&CK techniques are understood at that level of depth?
IOCs
Some techniques
Techniques targeted to your industry, region, or infrastructure
Prioritized targeted techniques
Relevance of Threat Intelligence¶
How much does the threat information relate to your organization?
Generic or freely available reporting
Industry-specific reporting (perhaps subscription)
Reports are created by in-house CTI team
Customized briefings from external groups
Utilization of Threat Intelligence¶
How well does your organization make use of the threat information?
Occasionally read
Regularly ingested for analysis
Contextualized for internal stakeholders outside of security team
Analyzed automatically
Dissemination of Threat Reporting¶
What threat information is passed along within an organization?
Tactical reporting with highly perishable information (IOCs)
Tactical reporting focused on adversary behavior (TTPs)
Operational-level reporting of pertinent campaigns
Strategic-level reporting of business risk