E1. Structured/ Machine Readable TI

E1. Structured/ Machine Readable TI


Knowledge of STIX, CYBOX and TAXII and how they relate to each other.


STIX (Structured Threat Information eXpression) is a standardised format representing intelligence and includes threat information such as context and relationships between different elements. For instance, it shows how TTPs are related to a particular threat actor. It has a structured format that communicates complex threat details with consistency.

CybOX (Cyber Observable expression) provides a standard to describe cyber observables (statements of fact), such as indicators and events. It is integrated within STIX to detail the observable elements to document and share threat data.

TAXII (Trusted Automated eXchange of Indicator Information) is a transport protocol that facilitates the sharing of threat intelligence over HTTPS. It defines services and message exchanges to enable the secure exchange of cyber threat information and is used to transport STIX data between organisations.


Knowledge of the content and format of different types of STIX message.


STIX messages use XML documents based on STIX schema (maintained by MITRE), which is comprised of nine top-level constructs that represent various aspects of threat intelligence:

  1. Observable:?Represents measurable events or properties of a cyber system, such as file hashes, IP addresses, domain names, and network connections.
  2. Indicator:?shows patterns of observables and behaviours that indicate malicious activity, such as a set of IP addresses, domain names, and file hashes linked to a malware family.
  3. Threat Actor:?Describes individuals, groups, or organisations believed to be behind malicious activities.
  4. Intrusion Set:?Groups of threat actors that share TTPs and resources.
  5. Campaign: Coordinated malicious activity linked to a threat actor or intrusion set.
  6. TTP (Tactics, Techniques, and Procedures): These are the methods used by threat actors to achieve their goals.
  7. Exploit Target:?Describes vulnerabilities or weaknesses that attackers can exploit.
  8. Course of Action:?Outlines steps taken to mitigate a threat or recover from an incident.
  9. Incident:?Represents a cybersecurity event that has already taken place.


Understanding of the advantages/disadvantages of machine-readable TI.


Advantages:

  • Automation:?Machine-readable TI supports the automation of threat data ingestion and integration. Security tools can automatically process and operationalise threat information which reduces manual workload.
  • Scalability:?With machine-readable formats like STIX, the handle of large volumes of threat data becomes more manageable, enhancing scalability.
  • Interoperability:?Standard formats such as STIX provide a common language that improves interoperability across different security tools and systems.

Disadvantages:

  • Complexity:?The implementation and management of machine-readable TI often demands specialised tools and expertise, which add complexity.
  • Context Loss:?Converting human-readable intelligence into machine-readable can cause the loss of valuable context or nuance and affect the accuracy and effectiveness of the intelligence.
  • Limited Adoption:?Adoption of these standard formats is not universal, which can create challenges when sharing information with entities that do not support them.
  • Data Overload:?Because of large volumes of data there are risks that automated systems overwhelm security teams with false positives and irrelevant information.

Despite the challenges, the benefits of speed, scalability, and interoperability often make machine-readable TI essential as cyber threats evolve and grow in complexity.

Saadna Ould zein

Senior Consultant Certified: ISO 27005 - Lead Risk Manager, EBIOS RM, CEH

5 个月

Also we can emphasize the need for continuous learning and adaptation when working with STIX, CybOX, and TAXII. Staying updated on the evolving threat landscape and regularly refining threat intelligence processes ensures that organizations maintain agility, leveraging these standards to proactively defend against emerging cyber risks.

要查看或添加评论,请登录

Nomene C.的更多文章

  • Crest Pratical Threat Intelligence Analyst Exam

    Crest Pratical Threat Intelligence Analyst Exam

    A. Key Concepts The key concepts underlying intelligence-led cyber threat assessments.

  • F5. CREST Code of Conduct

    F5. CREST Code of Conduct

    Demonstrate understanding of code as it applies to the individual. The CREST Code of Conduct outlines the…

  • F4. Dealing With Legal/ Ethical Uncertainty

    F4. Dealing With Legal/ Ethical Uncertainty

    Know appropriate action if given a task of questionable legality /ethics. When you receive a task that is legally or…

  • F3. Key Legislation Pertaining to Intelligence Collection in the UK

    F3. Key Legislation Pertaining to Intelligence Collection in the UK

    Demonstrate working understanding of the constraints on intelligence collection operations imposed by : Computer Misuse…

  • F2. Handling of Classified Material

    F2. Handling of Classified Material

    Understand GPMS classifications and their meaning. The Government Protective Marking Scheme (GPMS) is a classification…

  • F1. Understanding Requirement for Adherence to Legal/ Ethical Standards

    F1. Understanding Requirement for Adherence to Legal/ Ethical Standards

    Identify examples of illegal and unethical behaviour. Here are a few examples of illegal and unethical behaviours.

  • E3. Intelligence sharing

    E3. Intelligence sharing

    Understanding of “Need to Know” and “Need to Share” concepts. The limitation of the traditional “need to know” approach…

  • E2. Unstructured / Human Readable TI.

    E2. Unstructured / Human Readable TI.

    Understanding of the key advantages/disadvantages of spoken and written dissemination. Human-readable threat…

  • D6. Analytical Techniques.

    D6. Analytical Techniques.

    Be able to interpret data in graphical format, for example : A network diagram A timeline A histogram A scatterplot A…

  • D5. Cognitive Biases

    D5. Cognitive Biases

    Identify some of the major types of bias that can affect intelligence analysis. Cognitive biases are systematic errors…

社区洞察

其他会员也浏览了