cti-guide
Definitive Guide to Cyber Threat Intelligence
Authors and Contributions
Jon Friedman and Mark Bouchard, CISSP
Foreword by John P. Watters
Additional contributions by Jonathan Couch and Matt Hartley
Publisher Information
Published by: CyberEdge Group, LLC, Annapolis, MD
Copyright: © 2015, CyberEdge Group, LLC
ISBN: 978-0-9961827-0-6 (paperback); 978-0-9961827-1-3 (eBook)
About iSIGHT Partners
Leading Provider: Global cyber threat intelligence.
Key Offerings:
Deep analyses of adversaries and their tactics.
Rich threat context for security teams to counter advanced attacks.
Narrative reports and detailed threat data delivered through customer portal and API.
Research Team:
Distributed across 16 countries with local expertise.
Supported by 20+ technical data collection systems: sensors, honeypots, etc.
Customer Base: Includes top U.S. and global brands, government entities, and various industries.
Introduction to Cyber Threat Intelligence
Definition: Knowledge about adversaries and their motivations, intentions, and methods, aimed at protecting critical assets.
Importance: Nowadays, headlines focus on major cyber threats; therefore, understanding cyber threat intelligence is crucial for IT professionals.
Goal of the Guide: Address critical questions regarding cyber threat intelligence and offer structured guidelines for implementing programs.
Chapters Overview
Chapter 1: Defining Cyber Threat Intelligence
Reasons for necessity, key characteristics, and benefits.
Chapter 2: Developing Cyber Threat Intelligence Requirements
Importance of asset and adversary prioritization.
Chapter 3: Collecting Cyber Threat Information
Types of threat indicators and data collection methods.
Chapter 4: Analyzing and Disseminating Intelligence
Validation, prioritization, and dissemination methods.
Chapter 5: Utilizing Cyber Threat Intelligence
Applications at tactical, operational, and strategic levels.
Chapter 6: Implementing an Intelligence Program
Strategic roadmap and best practices for enhancement.
Chapter 7: Selecting Cyber Threat Intelligence Partners
Criteria and types of partners available.
Helpful Icons
TIP: Practical advice for application.
DON’T FORGET: Key information highlights.
CAUTION: Warnings for potential pitfalls.
TECH TALK: Technical content for IT practitioners.
ON THE WEB: URLs for additional resources.
Chapter 1: Defining Cyber Threat Intelligence
Importance of Cyber Threat Intelligence
The shift from mass attacks to targeted attacks necessitates advanced threat intelligence.
Characterizing Cyber Threat Intelligence
Adversary-based: Focuses on specific actors (criminals, state actors).
Risk-focused: Prioritizes risks to critical assets.
Process-oriented: Structured collection and analysis methods.
Diverse Consumer Tailoring: Information tailored for various consumers like SOC analysts and executives.
Benefits
Improves situational awareness and prioritization of security efforts across levels.
Chapter 2: Developing Cyber Threat Intelligence Requirements
Essential Asset Prioritization
Assets: Includes personal information, intellectual property, and credentials.
Risk Assessment: Assessing the impact of potential information loss and determining adversaries targeting these assets.
Types of Adversaries
Cybercriminals, cyber espionage agents, and hacktivists each with distinct targets and methodologies.
Chapter 3: Collecting Cyber Threat Information
Levels of Information Collection
Threat Indicators: Initial signs of compromise (e.g., file hashes, domain reputation).
Threat Data Feeds: Detailed correlation of indicators for patterns and trends.
Strategic Intelligence: Insights on motivations, intents, and methods from underground sources.
Collection Sources
Combining internal data with external feeds and reports for a robust intelligence picture.
Chapter 4: Analyzing and Disseminating Cyber Threat Intelligence
Transitioning from Information to Intelligence
Key Steps: Validating and prioritizing data, ensuring relevance.
Reporting Formats
Customizing intelligence output to meet the needs of different stakeholders.
Chapter 5: Using Cyber Threat Intelligence
Tactical Level Applications
Enhances operational techniques across IT operations, incident response, and management communications.
Functionality: Helps prioritize actions, improve screening protocols, and assess threats.
Chapter 6: Implementing an Intelligence Program
Development Stages
Develop Strategic Roadmaps: Aligning intelligence activities with business risks.
Perform Gap Analysis: Identifying and mitigating vulnerabilities in defenses.
Create a Knowledge Base: Store and manage intelligence for correlation and historical data.
Chapter 7: Selecting Cyber Threat Intelligence Partners
Types of Partners
Providers of threat indicators, threat data feeds, and comprehensive intelligence.
Selection Criteria
Critical factors include global reach, the extent of service, and historical data management.
Glossary of Terms
APT: Advanced Persistent Threat - an ongoing malicious threat targeting a specific entity.
IOC: Indicator of Compromise - artifacts indicating possible breaches.
PII: Personally Identifiable Information - information that identifies individuals.
TTPs: Tactics, Techniques, and Procedures used by adversaries for attacks.