Cyber Threat Intelligence
This section outlines the key components that have been identified for the CTI dimension as well as maturity levels within the components. These components and levels form the basis for assessing how threat informed an organization’s CTI program is. This assessment can be conducted using the companion spreadsheet published with this white paper.
Depth of Threat Data 1
What level of information (roughly relative to the Pyramid of Pain) is being used to track adversaries.
None
Ephemeral IOCs: hashes, IPs, domains: data sources an adversary can change easily
Tools / Software used by adversaries: tools or software which can be swapped or modified by an adversary to evade detection
Techniques and Tactics used by adversaries: the techniques and behaviors that are harder to change for an adversary
Low-variance adversary behaviors and associated observables: specific actions most implementations of a technique must use so it is very difficult for an adversary to change or avoid
Breadth of Threat Information
Complementary to the depth component score above, this component reflects roughly how many relevant Techniques are understood at that level of depth.
None
Single Technique
Multiple Techniques
All top-priority Techniques relevant to the organization
All Techniques relevant to the organization 2
Relevance of Threat Data
Where is the threat information coming from and how timely is it?
None
Generic reports or freely available reporting
Internal reports
Recent, in-depth reporting (often requires a subscription)
Customized briefings
Utilization of Threat Information
How is the threat information being used by an organization?
None
Lightly / occasionally read
Regularly ingested for analysis
Analyzed automatically 3 and/or by trained analysts
Contextualized in disseminated reports for other internal stakeholders to operationalize
Dissemination of Threat Reporting
What threat information is passed along within an organization? 4
None
Tactical reporting with highly perishable information (IOCs)
Tactical reporting focused on adversary behavior (TTPs)
Operational reporting on pertinent security trends
Strategic reporting on business impacts of security trends
References