Threat-Intelligence

Cyber Threat Intelligence Requirements

Cyber Threat Intelligence Requirements is Defining and setting up the requirements is the first task that must be accomplished before spending the resources and time on collecting any type of intelligence information.

Development of a set of requirements assists the security analysts in the following:

-Profile and monitor the threat actors targeting the organization.
-Collect the useful intelligence information based on the organization’s attack surface.
-Understand the type of TTPs used by threat actors to exploit vulnerabilities present in the organization’s network.
-Define and prepare the intelligence information in a detailed and right format for the audience.

Cyber intelligence requirements are divided into following categories:

 

Production Requirements

Production requirements should be complete and consists of information about the short-term requirements that right away head to the top of the priority list. Production requirements let intelligence function to have a well-structured template and cadence for the output of intelligence product.

Intelligence Requirements

One common question that is usually encountered by CTI analysts is whether to choose the intelligence requirements of an organization based on attack surfaces or threat actors. Intelligence requirements generally consist of known’s and unknowns about questions that the intelligence function needs to answer in order to provide knowledge and judgment-based decisions. Security analysts must find the answer to the following question before analyzing the intelligence requirements:

Collection Requirements

Collection requirements focus on either external sources or internal sources. The collection requirements focusing on external sources include threat actors, while the collection requirements focusing on internal sources include information on attack surfaces of an organization. The management of the organization plays an important role in the approval of the threat intelligence program.

It is crucial to convince the management by informing them about the drivers that led the analysts to build up the case, the obstacles the organization is facing in implementing the threat intelligence program, and the advantages in implementing the threat program in the organization.

Given below are the key factors that analysts can include while convincing management about the threat intelligence program:

 

Drivers

Drivers represent the difficulties and the setbacks that are being faced by the organization due to the lack of appropriate threat intelligence capability. These play an essential part as they signify what led to establishing a case to the management for a threat intelligence program.

This may include the following drivers:

– Highly vulnerable to risks
– Expensive maintenance of damaged and miss in assets
– Unavailability of resources
– Wastage of time and effort in patching inevitable security issues during a disaster
– Legal consequences for not complying with regulations
– Loss of reputation with existing and future customers

Obstacles

Obstacles symbolize the setbacks for the delay in beginning the project and the causes for the management not approving the threat intelligence program. Following are the key challenges that result in a delay of implementation of the threat intelligence program:

– Time consumption for the project is too high o Insufficient budget for new projects
– Risk of disturbance in business operations due to the change in process
– Compliance may constrain the productivity
– No clear ROI
– Highly assured <bout existing technical defenses to prevent harmful incidents

Benefits

In order to get the approval of the management, it is important that the benefits of having a threat intelligence program outweigh the obstacles to be valuable. Following are the benefits that can be mentioned:

-Decreasing repeated/recurring incidents
-Decreasing trepidation damage
-Improved security of assets
-Better productivity
-Increased awareness about the related incidents
-Improved readiness against threats
-Enhanced user satisfaction

Consuming Intelligence for Different Goals Generally, many threat intelligence programs focus on security data that is used for identification of indicators related to malware, tracking various malicious websites, etc. How is this threat intelligence useful for the organization’s environment? For threat intelligence to apply to various business strategies, organizations and researchers need to extract contextual intelligence that focuses on more generic data related to the organization. Organizations consume threat intelligence to meet different goals such as:

Brand Protection

Protection of the organization’s brand is an important goal. Misusing the brand can cause severe damage to the reputation of an organization. So, organizations can use threat intelligence to identify unauthorized brand usage such as phishing sites and identify negative comments on various social networking sites.

Identification of Attacker Networks

In many cases, the internal monitoring controls of an organization may fail to detect compromised systems in the network. In such cases, organizations need to incorporate threat intelligence into the security monitoring controls to identify the adversaries’’ command and control network & compromised systems. Also, threat intelligence helps organizations to protect their IT assets from such attacks by sending Appropriate alerts before the payment processing systems or law enforcement warns About the compromise.

Identification of Third-Party Risks

Another important aspect of threat intelligence is identifying third-party risks. Although these are not direct risks, this information helps organizations to understand the security risks while communicating with different business partners. This further helps organizations in establishing additional security controls on those communications to perform aggressive monitoring on data exchanges with the
business partners.

Leave a Comment

Your email address will not be published. Required fields are marked *