Want to start with proactive cybersecurity? Here's 3 steps to do that today.
Interestingly, 'proactive cybersecurity' is often pitched as a problem that technology alone can completely solve, but in my experience, it usually isn’t.
I've had a lot of success using narratives, what I'd like to call 'threat scenarios'.
Using them as connective tissue between teams, sometimes with technology and sometimes without.
Always as a 'compass' to understand what are potential futures and pasts.
You can operationalize this through a 'library,' and I’ve broken down the key steps in this post so you can start building your own today.
Including basic components, how it could fit into your intel cycle and (more importantly) sharing some ideas how to integrating the library into your daily operations using structured simulations & continuous feedback loops.
Let's get started.
??
Why everyone should consider building a threat scenario library
Because we're in the business of decision-support, this topic deserves some specific attention.
For example, I meet with teams that have limited budget and think they should not be prioritizing this sort of activities.
They couldn't be more wrong and are truly missing out.
Here's 5 reasons why:
I can go on, except you probably start to see why this is a smart approach.
1/3. Getting started with libraries
Now, back to the how.
When starting an engagement, I often use a systems thinking approach to examine the existing libraries or knowledge repositories teams have built.
There are many factors to consider, but I always view this as a fundamental element to gauge how well the system performs.
You’d be surprised how frequently libraries are misaligned or poorly structured.
Teams often create something that works within their own constraints, but they fail to connect it to the broader system.
I believe this is a missed opportunity, especially when it comes to building a threat scenario library: multiple, integrated stakeholders are crucial for effective decision support and proactive cybersecurity.
Here's three questions I typically start from:
This gives me a sense of elements in place, their status and current direction-of-travel.
Crucial components to get right
With any library, but most importantly with a threat scenario library, there's a few key things to get right.
Importantly, these aspects don't involve technology yet; that comes later.
These are as followed:
Components that provide bonus points:
Often components are fragmented, different components residing with different teams.
To make a system, you need all these parts to work together.
2/3. Utilizing scenarios for integration & simulation
This is where the technology discussion usually begins but as mentioned earlier: I'm a strong believer of thinking about process first - technology second.
Activities traditionally involve gathering intelligence from various sources such as internal reports, threat intelligence feeds, and cross-departmental insights to build a realistic foundation.
Next we analyze past incidents to understand attack patterns, TTPs, and consequences, using these to create relevant scenarios. We prioritize scenarios by mapping them to critical assets and business processes, ensuring alignment with organizational objectives.
Whichever solution you choose to support your library must be able to accommodate these steps.
Here's a few considerations to help you determine the best technology solution:
I've seen different teams end up in different places, here's a few examples:
The most important criteria are, and should always be, connection and accessibility.
If the solution doesn't leverage these two elements to aid the business bottom-line, then you're missing out on opportunities to become even more successful.
Now that you have defined why you are building the library, now you will start populating it with content.
Determining scenario structure that will be added to the library
Define your scenarios first.
This will be the taxonomy you use to communicate across different parts of your organization.
Here's a couple of ideas:
The challenge often isn't creating a structure but building and maintaining these scenarios.
For this exact usecase, we've created our Scenario Intelligence repository: Instantly 30+ threat scenario templates which you can customize.
With our approach, teams can set everything up in under 10 minutes.
领英推荐
(if you want to know more, let me know!)
You populate scenarios according to your desired format.
To give you a simple, visual example how I explain the use of scenario's for risk and threat management:
Every stakeholder has a different usecase, except we all know and understand what's the main objective. In the case of the image, the objective is to build a penguin. In case of managing hundreds of ransomware strains, it could be preventing all of them from happening.
All involved stakeholders have a role to play in the 'system'. We annotate and tag this accordingly.
Through the use of sequences, we can begin to develop a narrative around how the different strains of ransomware actually will get into the environment. This will also allow us to have a discussion on where we can defend most effectively.
Finally, we include known adversary profiles or data/information sets to consider potential attack paths. Potentially integrating with other technology solutions that provide details.
Once we've prepared the scenario, we can either roll with that or go a step further and start visualizing it. I'm personally big fan of visualizations because that's how my brain works but its OK if your different.
Additionally, to establish them content-wise you can also perform a scenario planning exercise.
In the future, I will also make sure we do a separate system on scenario planning.
Sign-up for our newsletter at venation.digital/newsletter and you will be the first to have it.
One more thing - at this stage you can officially state that you have a Threat Model !
3/3. Using & maintaining your threat library
Using the scenarios for simulation
Making the scenarios is one thing, now you need to use them.
Usecases are numerous but to name a few:
Running scenario simulations is crucial for testing and validating these scenarios, allowing different teams to practice and refine responses under controlled conditions.
For example, if you developed scenarios that are too generic then they will probably satisfy an audit requirement but won't add value; the added value is going beyond generic threat description by including variable aspects, such as multi-sequences of the attacks involving specific lateral movement or data exfiltration procedures.
This complexity enables you to test different variations, assessing team readiness for unexpected events and the effectiveness of control measures.
A cool aspect is incorporating decision points within scenarios where teams must choose between multiple options, simulating real-life pressures and testing decision-making capabilities.
A simple and effective method to do this is a tabletop exercises.
This lets you validate response actions and improve team coordination across functions, ensuring the scenario aligns with real-life possibilities.
We've published our approach to tabletops as a system in Venation PRO. For high-risk scenarios, I recommend conducting red team exercises or penetration tests.
These can simulate full attack sequences or replicate specific techniques, giving you a deeper understanding of how well-prepared your teams are.
Finally, review and refine your scenarios based on the insights and feedback gathered from each simulation.
Updating the content within your central threat scenario library ensures that it remains accurate, relevant, and effective.
Key parts to get right when it comes to maintenance
The threat scenario library must be a living resource that evolves with the threat landscape, continuously updated based on intelligence and feedback.
It thrives within a community, not an individual team.
It is crucial that teams have responsibilities assigned:
For instance, the CTI team might track actor behaviors and translate them into scenarios, while the GRC team ensures risk assessments align with those behaviors, and the detection engineering team confirms detection capabilities are in place.
Here's a few considerations about those responsibilities:
Finally, remember that a library should be a bridge, not a silo.
It’s crucial to use it as a tool for connection across the organization.
Avoid keeping scenarios isolated within teams, just collaborate and share the narratives so everyone understands their role and where to find information.
Empower the organization by turning every scenario into opportunities to explore advantages to the business bottom-line.
Let's make this week count!
GJ
PS.
Enjoy this? ?? Repost it to your network and follow Gert-Jan Bruggink & Venation for more.
Want proven systems to make smarter decisions on managing digital risk?
Join our community of forward-thinking cybersecurity decision-makers today: