Threat Intelligence Program Model
Transcription
Threat Intelligence Program Model
Threat Intelligence Program Model v3.5 March 26th, 2015 Proprietary and Confidential. Do Not Distribute. © 2014 Accuvant, Inc. All Rights Reserved. The problem Threat Intelligence The solution (also a problem) An opportunity Static enterprise security programs aren’t evolving to meet modern threats to the business. A highly specialized and fractured solution market is creating more problems than it’s solving. Complementing your enterprise security program with threat intelligence in a pragmatic, measurable approach. Proprietary and Confidential. Do Not Distribute. © 2014 Accuvant, Inc. All Rights Reserved. PROGRAM FOUNDATIONS 3 Proprietary and Confidential. Do Not Distribute. © 2014 Accuvant, Inc. All Rights Reserved. Defining Threat Intelligence Working definition: “An ecosystem of contextually relevant and evidence-based knowledge – integrated into platforms and tools – to quickly and accurately address dangers to individuals, organizations, or assets in a standardized, consumable format” 4 Proprietary and Confidential. Do Not Distribute. © 2014 Accuvant, Inc. All Rights Reserved. Making the Business Case 3 Common threat intelligence program drivers 1. Improve efficiency of current resources • 2. Increase speed & efficiency of detection • 3. answer the “are we spending, operationalizing smartly?” question with better intelligence, malicious activity can be detected sooner, and more effectively Increase efficiency of response • having in-depth knowledge of an adversary or piece of malware means IR teams can be more effective at remediation/forensics Bonus: Reduce overall attack exposure/opportunity • 5 intelligence can help drive IT and business decisions – future planning is more effective Proprietary and Confidential. Do Not Distribute. © 2014 Accuvant, Inc. All Rights Reserved. The Foundation for the Program Foundational operational proficiencies (things you should already do fairly well) 1. Data classification and governance 2. ITIL fundamentals • Change, configuration and asset management 3. Vulnerability management 6 Proprietary and Confidential. Do Not Distribute. © 2014 Accuvant, Inc. All Rights Reserved. Operational Goals Threat Intelligence empowers security operations 1. Prevent known threats more effectively • How? Timely, accurate, shared threat data 2. Detect malicious activity more quickly • How? Reduce noise in the telemetry 3. Respond more effectively • How? Deliver timely actionable threat information 4. Recover more completely • How? Incorporate business context into threat knowledge 7 Proprietary and Confidential. Do Not Distribute. © 2014 Accuvant, Inc. All Rights Reserved. ANALYZING THE SOLUTION MARKETPLACE 8 Proprietary and Confidential. Do Not Distribute. © 2014 Accuvant, Inc. All Rights Reserved. Analyzing the Solution Marketplace Intelligence Sources PEOPLE Threat Intelligence Solution + PROCESS Mitigating Technologies Fusion and Analytics Platforms 9 Proprietary and Confidential. Do Not Distribute. © 2014 Accuvant, Inc. All Rights Reserved. Intelligence Sources Components Higher-level strategic intelligence focused on specific threat actors or campaigns, meant to drive long-term action. strategic reports strategic value Directly actionable intelligence highlighting a specific threat actor or ongoing campaign. tactical reports Composite indicators focusing on comprehensive profiling aiding (mainly) automated systems. signatures Atomic indicators focusing on fidelity, severity, timeliness feeding automated prevention, detection response platforms static indicators data volume 10 Proprietary and Confidential. Do Not Distribute. © 2014 Accuvant, Inc. All Rights Reserved. Another View of Intelligence Content Static Indicators Half-life: short Volume: very high Focus: blocking, infrastructure level Primary consumption: machine 11 Signatures Half-life: moderate Volume: high Focus: detection, analysis, blocking Primary consumption: machine, human Tactical Reports Half-life: moderate Volume: low Focus: response Primary consumption: human Strategic Reports Half-life: extensive Volume: low Focus: strategic Primary consumption: human Proprietary and Confidential. Do Not Distribute. © 2014 Accuvant, Inc. All Rights Reserved. Fusion and Analytics Platforms Analytics Platform Response Procedures Raw Internal Telemetry Raw Intelligence Triage Inbound Raw Intelligence Data Enrichment Procedures Fusion Platform 12 Proprietary and Confidential. Do Not Distribute. © 2014 Accuvant, Inc. All Rights Reserved. Raw External Data Mitigating Technologies 01Prevention 13 – Platforms focused on eliminating known threats 02Detection – Platforms focused on decreasing time to discovery and minimizing impact of a potential incident 03Response – Platforms focused on full or partially automated attack and incident response capabilities 04Recovery – Platforms focused on post-incident investigation and restoration of services, processes and systems Proprietary and Confidential. Do Not Distribute. © 2014 Accuvant, Inc. All Rights Reserved. MATURITY MODEL 14 Proprietary and Confidential. Do Not Distribute. © 2014 Accuvant, Inc. All Rights Reserved. 5 goals of a maturity model 2. Define an achievable roadmap 1. Help organizations focus on their security goals 15 4. Define a complete operational, actionable framework 3. Focus on maturing capabilities delivered through resources Proprietary and Confidential. Do Not Distribute. © 2014 Accuvant, Inc. All Rights Reserved. 5. Provide a framework for measurable results Program Maturity Model Aware Enterprise acquires threat data mainly to understand general threats, define strategy, program architecture and develop a business case. 16 Reactive Enterprise deploys product-centric response functions in existing technologies leveraging intelligence w/o extensive human intervention to decrease threats. Adaptive Purposeful Enterprise leverages intelligence vetted with human-driven processes to improve security operations; focus on repeatability, scalability, efficiency. Refined Threat intelligence is leveraged to drive focused action in detection, response, and recovery utilizing bi-directional knowledge sharing. Proprietary and Confidential. Do Not Distribute. © 2014 Accuvant, Inc. All Rights Reserved. Strategic Threat intelligence program is key to decision support, used to drive future strategy and forward risk reduction; focusing on longterm strategic planning. Program Maturity Model Maturity Aware Enterprise acquires threat data mainly to understand general threats, define strategy, program architecture and develop a business case. 17 Reactive Enterprise deploys product-centric response functions in existing technologies leveraging intelligence w/o extensive human intervention to decrease threats. Adaptive Purposeful Enterprise leverages intelligence vetted with human-driven processes to improve security operations; focus on repeatability, scalability, efficiency. Refined Threat intelligence is leveraged to drive focused action in detection, response, and recovery utilizing bi-directional knowledge sharing. Proprietary and Confidential. Do Not Distribute. © 2014 Accuvant, Inc. All Rights Reserved. Strategic Threat intelligence program is key to decision support, used to drive future strategy and forward risk reduction; focusing on longterm strategic planning. Program Maturity Model Aware Enterprise acquires threat data mainly to understand general threats, define strategy, program architecture and develop a business case. 18 Reactive Adaptive Purposeful Maturity in business alignment Proprietary and Confidential. Do Not Distribute. © 2014 Accuvant, Inc. All Rights Reserved. Strategic Threat intelligence program is key to decision support, used to drive future strategy and forward risk reduction; focusing on longterm strategic planning. Program Maturity Model Maturity in technical capabilities Aware Reactive Enterprise deploys product-centric response functions in existing technologies leveraging intelligence w/o extensive human intervention to decrease threats. 19 Adaptive Purposeful Enterprise leverages intelligence vetted with human-driven processes to improve security operations; focus on repeatability, scalability, efficiency. Refined Threat intelligence is leveraged to drive focused action in detection, response, and recovery utilizing bi-directional knowledge sharing. Proprietary and Confidential. Do Not Distribute. © 2014 Accuvant, Inc. All Rights Reserved. Strategic ADDRESSING THREATS 20 Proprietary and Confidential. Do Not Distribute. © 2014 Accuvant, Inc. All Rights Reserved. Distinguishing Threat Types Keys to differentiating threat types: • • 21 Targeting –whether the victim is one of opportunity, or specifically tasked (individually, by industry, or in another manner) Persistence –whether the intent is a long-term embedded or short-term infiltration; generally speaking to a level of stealth and extent of infiltration Category Targeting Persistence Example Generic no no ransomware Targeted yes no credential thief Persistent yes yes embedded RAT Proprietary and Confidential. Do Not Distribute. © 2014 Accuvant, Inc. All Rights Reserved. Program Maturity Model Threat Addressed: Persistent Aware Enterprise acquires threat data mainly to understand general threats, define strategy, program architecture and develop a business case. Reactive Adaptive Threat Addressed: Targeted Enterprise deploys Enterprise leverages product-centric intelligence vetted response functions in with human-driven existing technologies processes to improve Threat Addressed: Generic leveraging intelligence security operations; w/o extensive human focus on intervention to repeatability, decrease threats. scalability, efficiency. 22 Purposeful Refined Threat intelligence is leveraged to drive focused action in detection, response, and recovery utilizing bi-directional knowledge sharing. Proprietary and Confidential. Do Not Distribute. © 2014 Accuvant, Inc. All Rights Reserved. Strategic Threat intelligence program key to decision support, used to drive future strategy and forward risk reduction; focusing on longterm strategic planning. MODEL COMPONENTS 23 Proprietary and Confidential. Do Not Distribute. © 2014 Accuvant, Inc. All Rights Reserved. Program Maturity Model Aware Enterprise acquires threat data mainly to understand general threats, define strategy, program architecture and develop a business case. 24 Reactive Adaptive KPIs Purposeful Enterprise deploys product-centric response functions in existing technologies leveraging intelligence w/o extensive human intervention to decrease threats. Enterprise leverages intelligence vetted with human-driven processes to improve security operations; focus on repeatability, scalability, efficiency. Refined Threat intelligence is leveraged to drive focused action in detection, response, and recovery utilizing bi-directional knowledge sharing. Achievements and Capabilities Operational Components Pre-Requisites Drivers Proprietary and Confidential. Do Not Distribute. © 2014 Accuvant, Inc. All Rights Reserved. Strategic Threat intelligence program is key to decision support, used to drive future strategy and forward risk reduction; focusing on longterm strategic planning. Maturity Model Components Drivers Drivers for adoption of each level of maturity Pre-Requisites Operational and business components each level of maturity is dependent upon Operational Components Components (people, process, technologies) of each maturity level Achievements & Capabilities Capabilities delivered to the organization at each level of maturity KPIs Measurable artifacts from each level of maturity 25 Proprietary and Confidential. Do Not Distribute. © 2014 Accuvant, Inc. All Rights Reserved. COMPONENT PROCESS MODEL 26 Proprietary and Confidential. Do Not Distribute. © 2014 Accuvant, Inc. All Rights Reserved. Developing a Process Model Survey existing enterprise threat intelligence programs • Develop and define world class process model • Define functional components at all 5 maturity levels • Which process component present • How does that process component manifest Note: Maturity is not linear, however it is additive 27 Proprietary and Confidential. Do Not Distribute. © 2014 Accuvant, Inc. All Rights Reserved. core processes Intialize acquisition collaboration triage distribution execution enrichment development secondary development Complete process components present in a world class organization. 28 feedback refinement (finishing) strategy governance measurement Proprietary and Confidential. Do Not Distribute. © 2014 Accuvant, Inc. All Rights Reserved. Components Explained 29 Component Explanation Acquisition Intake of threat intelligence (external or internal) Development Internal development of threat intelligence Triage Process of normalization, correlation and initial analysis Collaboration Incorporation of additional teams for analysis (internal or external) Enrichment Incorporation of additional context or data Distribution Dissemination of actionable intelligence Execution Decision and associated action on intelligence Feedback Active feedback loops to improve other components Strategy Threat Intelligence advising on security, risk, business strategy Governance Program management to goals and objectives Measurement Defining and quantifying metrics and KPIs Proprietary and Confidential. Do Not Distribute. © 2014 Accuvant, Inc. All Rights Reserved. Process Cycle Measure 1. 2. 3. 4. 5. 6. 7. Clearly define need Assess existing capabilities Define goals Implement components Mature the capabilities Measure against goals Repeat Assess Capabilities Mature Implement 30 Define Need Proprietary and Confidential. Do Not Distribute. © 2014 Accuvant, Inc. All Rights Reserved. Define Goals Now what? Check out the Threat Intelligence Primer • http://www.accuvant.com/resources/threat-intelligence/ Look for the Threat Intelligence Blueprint • Coming shortly Let’s build it together • Ask me how. 31 Proprietary and Confidential. Do Not Distribute. © 2014 Accuvant, Inc. All Rights Reserved. Proprietary and Confidential. Do Not Distribute. © 2014 Accuvant, Inc. All Rights Reserved.