Threat Intelligence Fundamentals

Threat Intelligence Fundamentals
Author: David Balaban – PrivacyPC.Com
Information security professionals may have different perspectives about what exactly threat intelligence is, what tasks it should solve, and how a company can benefit from deploying solutions of this sort. This term is often interpreted as a set of techniques for collecting and analyzing indicators of compromise (IOCs) to form an extra layer of protection mechanisms. However, the functionality of the resulting security systems is somewhat opaque. Let’s add some clarity to this subject and figure out who gets the most mileage out of such practices.
What is threat intelligence and who needs it?
Threat intelligence is an entirety of data that allows IT experts to understand a threat and make informed security decisions. This can be both low-level data (e.g. file hashes and IP addresses), and information about a specific attacker seeking to infiltrate a target system. Many professionals prefer using the broader concept of security intelligence that includes threat intelligence, vulnerability intelligence, brand intelligence, and other components of the defense equation.
A few years ago, when this term debuted in the cybersecurity arena, it could mean just about anything. The situation is now more structured and there are standards that make the concept more distinct, and yet it is still debatable whether this technique is part of the overarching security intelligence domain.
In essence, threat intelligence boils down to data as well as the ways it is collected and evaluated. The context of threat information is hugely important. Analysts need to understand if specific data is appropriate for decision-making and link IOCs with specific reports and vulnerabilities.
The layer of technical data plays a big role in threat intelligence, but the right approach should also involve the strategic layer. A security expert must stay on top of operational and tactical layer information and be able to grasp the applicability of certain vulnerabilities and reports.
Threat intelligence can be integrated into different enterprise workflows. In particular, the InfoSec department typically combines it with the general context of the current cybercrime landscape that goes beyond specific attack vectors that pose risk to the organization. On the other hand, investigating an incident requires figuring out who is behind the malicious activity and what techniques were used. Depending on where threat intelligence is leveraged in the company and for what purpose, there are different requirements for its content as well.
Why does an organization need threat intelligence when it has other security and data collection mechanisms in place, such as an intrusion detection system (IDS), a next-generation firewall (NGFW), and a security information and event management (SIEM) solution? It helps piece the whole security picture together and step away from the reliance on individual tools or vendors. This is especially important for businesses whose security postures involve threat response.
With cyber threat intelligence techniques in its toolkit, a company can also gain insights into threats outside of the security perimeter that have not yet been detected by its security solutions. Another noteworthy point is that many defensive solutions have blind spots that attackers might exploit. Threat intelligence closes these gaps. The need for this tactic stems from the rapid evolution of cyber perils – as they become more complex, security tools have to match this sophistication.
At the technical level, threat intelligence is used to facilitate the following activities:
- Incident response
- Proactive threat hunting
- Security monitoring
- Malicious code analysis
- Intrusion detection.
- Automation options
- Integration and interoperability
- Update frequency
- Enrichment with metadata
- Complexity rating
- Darknet visibility
- Geolocation accuracy
- The number and range of sources
- Quality