The Value of Sharing Cyber Threat Intelligence
With the diversity, sophistication, and volume of cyber-attacks growing each day it would be unwise for Australia’s Critical Infrastructure companies to stand-alone. Sharing Cyber Threat Intelligence (CTI) helps them stand together and build collective cyber defence.
The need for sharing community-sourced CTI has increased as organisations have pursued digital transformation agendas, which will only accelerate with the use of new technologies such as AI and automation. This adoption will further exacerbate the digital footprints and attack surfaces of companies as technical vulnerabilities open up more ways for attackers to breach their perimeters and cause harm and disruption.
Gartner define threat intelligence as evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding response to that menace or hazard.
CI-ISAC argues that highly curated information is needed to make better decisions about how to defend an organisation from cyber-based threats. Some of the questions threat intelligence answers include:
Threat intelligence always has a purpose?–?to inform decision making and drive action to reduce fraud and cybercrime, to prevent data loss and protect Personally identifiable information?(PII) and reduce overall business risk.
The value of Threat Intelligence has been widely recognised and as such is increasingly adopted in standards, frameworks and best practices either as a mandatory control or recommendation; e.g., APRA CPS234, AEMO AESCSF. These are explained below.
The Australian Prudential Regulation Authority's (APRA) Information Security Standard CPS 234 institutes requirements around information asset identification and classification, information security roles and responsibilities, implementation and testing of information security controls, incident management, internal audit, and breach notification. It makes clear that the Board is ultimately responsible for information security. It calls for protective measures to be commensurate with the size of the organisation and the threats faced. It includes requirements around management of third party (supplier) risk management.?
The Australian Energy Market Operator (AEMO) uses the Australian Energy Sector Cyber Security Framework (AESCSF) Program to enable its Australian energy sector participants to assess, evaluate, prioritise, and improve their cyber security capability and maturity.
Defence Companies
The value of sharing community-sourced CTI is probably more important than it is in other critical infrastructure sectors because of the Defence Industry Security Program (DISP), which provides confidence and assurance in the secure delivery of goods and services to the Department of Defence when partnering with industry. DISP is a risk management program that strengthens security practices in partnership with industry, and enables members to have their security practices recognised by Defence and Defence’s international industrial security partners. DISP enhances Defence’s ability to manage risk in the evolving security environment and provides confidence and assurance to Defence and other government entities (either Australian or foreign) when procuring goods and services from industry members.
领英推荐
Drawing on several standards across the critical infrastructure sector and the expectations of defence companies under DISP, there are several areas that all critical infrastructure companies, and especially defence companies, should consider as they determine the extent to which they participate in CTI sharing to improve their cyber resilience and cyber risk management:
In addition to these areas from several standards, all critical infrastructure companies are now obliged to observe the new SoCI (Security of Critical Infrastructure) legislation and the three possible positive security obligations that can apply to certain classes of critical infrastructure assets:
The Australian Government’s articulated approach to cyber and information security recognises that all parties have an ongoing role to play in securing our digital future – a combined responsibility that is reflected in the recently updated SoCI legislation.
It is also important to note that risk profiles for CI providers may be very different. Not all digital and cyber risks are relevant for all CI stakeholders. The different risks that are relevant to information technology (IT) security may be quite different to the requirements to manage the risks associated with operational technology (OT). Further to this, given that IT and OT infrastructure architectures continue to converge and expand to include mobile, cloud, and internet of things (IoT) devices, the need for a robust risk-based approach and integrated cyber risk management plan is crucial to manage the security of Critical Infrastructure.
Sharing cyber threat intelligence is a key element of a robust risk-based approach and fundamental to an integrated cyber risk management plan. The Critical Infrastructure Information Sharing and Analysis Centre (CI-ISAC) can assist here by providing a platform and forum for companies to share cyber threat intelligence and to learn from others so cyber defences can be bolstered, thereby helping those companies to get ahead of the cyber attackers.
This article was co-authored by CI-ISAC strategic advisors, Dr Gary Waters and Kevin Vanhaelen .
For more information on CI-ISAC, email [email protected] or visit: www.ci-isac.org.au
?
Patrick Wright given your recent comments regarding cyber war and how we can unite industry for total defence.
CISO - Board and Executive Cyber Advisory - Elevating cyber maturity - Improving cyber resilience
1 年Thanks Kevin Vanhaelen and Gary for taking the time to put this together. It's immediately obvious that, as a country we will always be #strongertogether if industry can participate in a capability that allows the trusted sharing of intel in a true bi directional manner.
Cyber Threat Intelligence
1 年Great write up Kevin Vanhaelen and Gary! Thanks for sharing.
Cybersecurity Leader | Chair at Australian Cyber Network | Chair at DSI (SMB1001) | Founder at MurFin | Advocate for SMB Protection & Growth | ‘Cyber Team Australia’ Strategist | Speaker & Thought Leader | Innovator
1 年I / AustCyber is looking forwards to working together on all of our joint projects.