Implementation Framework – Cyber Threat Prioritization 4.1

advertisement
Implementation Framework –
Cyber Threat Prioritization
Troy Townsend
Jay McAllister
September 2013
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE Implementation Framework – Cyber Threat Prioritization
4.1
Copyright 2013 Carnegie Mellon University
This material is based upon work funded and supported by ODNI under Contract
No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the
Software Engineering Institute, a federally funded research and development center
sponsored by the United States Department of Defense.
Any opinions, findings and conclusions or recommendations expressed in this
material are those of the author(s) and do not necessarily reflect the views of ODNI
or the United States Department of Defense.
NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE
ENGINEERING INSTITUTE MATERIAL IS FURNISHEDON AN “AS-IS” BASIS.
CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER
EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED
TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY,
OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON
UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO
FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT.
This material has been approved for public release and unlimited distribution except
as restricted below.
Internal use:* Permission to reproduce this material and to prepare derivative
works from this material for internal use is granted, provided the copyright and “No
Warranty” statements are included with all reproductions and derivative works.
External use:* This material may be reproduced in its entirety, without modification,
and freely distributed in written or electronic form without requesting formal
permission. Permission is required for any other external and/or commercial use.
Requests for permission should be directed to the Software Engineering Institute at
permission@sei.cmu.edu.
* These restrictions do not apply to U.S. government entities.
DM-0000620
4.2
Implementation Framework – Cyber Threat Prioritization
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE
Implementation Framework –
Cyber Threat Prioritization
Background
The Software Engineering Institute (SEI) Emerging Technology Center at
Carnegie Mellon University studied the state of cyber intelligence across
government, industry, and academia to advance the analytical capabilities
of organizations by using best practices to implement solutions for shared
challenges. The study, known as the Cyber Intelligence Tradecraft Project
(CITP), defined cyber intelligence as the acquisition and analysis of
information to identify, track, and predict cyber capabilities, intentions, and
activities to offer courses of action that enhance decision making.
legitimate threats to the organization. Instead of prioritizing a cyber threat
solely on the capability and intent of threats actors, the framework enables
analysts to see the utility of also understanding the threat’s relevance to
their organization, strengthening their threat prioritization as they come to
realize that a somewhat capable actor with a desire to deface websites
should not be considered in the same category as a highly capable actor
intent on extracting confidential, strategic documents for extortion or
blackmail.
A significant challenge that emerged from the CITP was the way in which
analysts prioritize cyber threats. The SEI team observed a diverse array of
approaches, from analysts relying on the media and third-party intelligence
service providers to using data-centric models based on a narrow scope
of factors.
When threat prioritization models are too narrow, they prevent analysts
from effectively monitoring the changes and evolution of the most relevant
and severe cyber threats. This hinders cyber intelligence and security
professionals from proactively implementing defenses to guard against
the latest attack trends and techniques. Among the CITP’s government
participants, most intelligence analysts prioritized cyber threats by the
likelihood of an actor executing an attack, which they quantified through
the summation of an actor’s sophistication (capability) measured against
their desire to target the organization (intent). The SEI team noted that as
these analysts transitioned to the private sector, so too did this approach.
Conversely, private sector CITP participants without experienced
government intelligence analysts tended to discount the utility of knowing
the threat actor and prioritized cyber threats by the impact attack methods
had on the organization or the risk attack methods posed because of the
organization’s known vulnerabilities.
This Cyber Threat Prioritization Implementation Framework leverages the
best practices of CITP participants and SEI expertise to offer a holistic
approach to prioritizing cyber threats using a customized, tiered threat
prioritization framework. The framework breaks down cyber threats into
three core components: the likelihood of threat actors executing attacks,
the impact threats have on an organization’s business, and the risk threats
pose because of an organization’s known vulnerabilities. By assessing
threats according to these components, analysts come to fully understand
the causes and effects of relevant threats, which significantly improves
the efficiency of their organization’s cyber intelligence efforts because
they have the necessary context to accurately align analytical and
security resources to the current and future cyber attacks posing the most
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE Implementation Framework – Cyber Threat Prioritization
4.3
Examples of how assessing threats according to this elements and factors augments an analyst’s cyber in
Factor
Factor
Factor
Factor
Description, Description, Description, Description, Examples threats Examples three Examples Examples • Identify cyber using the core components of a threat. Implementation
Examples: Indicators of Success
Here’s how analysts can leverage the Cyber Threat Prioritization
4. A
ssess the likelihood,
impact,
and risk
of the-­‐ cyber
threats. Use thecompetitors, c
Likelihood: Threat actors State-­‐sponsored, Implementation Framework to augment their organization’s cyber
factors
andasub-elements
in
each
spider
graph
threats Impact: ttack types -­‐ D
DoS, stealing intellectual property (
Examples of how assessing ccording to tA
his element athreat
nd its scomponent’s
ub-­‐
intelligence efforts:
rate the
elements cas
a low, medium, or high priority
elements and factors ato
ugments an corresponding
analyst’s cyber intelligence apabilities. Risk: Known vulnerabilities -­‐ High-­‐profile employees, unpat
attribute of the threat. The average of these ratings then determines
1. Adopt these definitions:
the likelihood,
impact,
• Identify cyber threats using the three core components of a threat. and risk of the threat, which combine to indicate
Threat = Likelihood + Impact + Risk
Assess the litikelihood, impact, aand risk of the orcyber threats. Use the factor
whether
should be considered
low,
medium,
high priority
threat.
Examples: Likelihood
= Capability + Intent
spider graph to rate the corresponding elements as a low, medium, or hig
Likelihood: Threat actors -­‐ State-­‐sponsored, criminals, hactivists, recreational Impact = Operations
+ Strategic
Interests
Example: Acnompetitors, organization wants
to know
how it should
prioritize hackers these ratings then determines the likelihood, impact, and risk of the threa
Risk = People
+
Cyber
Footprint
its
analytical
and
network
defense
efforts
for
a
possible
Impact: Attack types -­‐ DDoS, stealing intellectual property (IP), damaging/incapacitating network assets considered a low, medium, or high priority recreational
hacker DDoS
attack
on thethreat. organization’s
secure
Risk: Known vulnerabilities -­‐ High-­‐profile employees, unpatched devices, unsecured remote access Example: payment site. Analysis indicates the likelihood of the recreational
2. Become familiar with the provided spider graphs to gauge the factors
hacker
executing
the attack
is high
to his
attack
methods
An organization wants to due
know how it should prioritize its a
Assess he likelihood, impact, and risk of the cyber threats. and
Use the factors and sthe
ub-­‐elements each threat that comprise each
of thetthree
threat components.
resources.
However,
impact of thein DDoS
attack
is component’s recreational hacker DDoS attack on the organization’s secu
Spider graph
key:graph Titletof
low
because
the asecure
payment
site
has minimal
spider o threat
rate tcomponent
he corresponding elements as a low, assessed
medium, asor high priority ttribute of the threat. The average of
the recreational hacker executing the attack is high due to Description and example from
impact
on
the
organization’s
operations
and
strategic
interests
these ratings then determines the likelihood, impact, and risk of the threat, which combine to indicate whether it should b
of the DDoS abeta
ttack is assessed s low the
because the s
a CITP participant
due toimpact it still being
in internal
testing.
This alsoameans
considered a low, medium, or high priority threat. organization’s perations nd strategic nterests due to it s
risk associated
with theoattack
is lowabecause
of the isecure
Threat Component (likelihood, impact, or risk)
Example: payment
site’s
limited
interaction
with
people
and
cyber
Description
the risk associated with the attack is low because of the sec
An organization wants to know how it should prioritize its analytical and network efense efforts footprint.
this threat,
which
initiallydappeared
a for a poss
and Therefore,
cyber footprint. Therefore, this threat, towbe
hich initially a
high priority, snow
canpbe
classified
as aAmedium
low threatthe likelihood
recreational hacker DDoS attack on the organization’s ecure ayment site. nalysis to
indicates as a
m
edium t
o l
ow t
hreat r
equiring m
inimal a
nalytical and
requiring
and
attention. However, the
Element of the
of the hacker executing the attack the Element
recreational is high minimal
due to analytical
his attack mnetwork
ethods defense
and resources. Threat Component
Threat Component
Note: Always factor timing into the threat prioritization assessment. When
impact of the DDoS attack is assessed as low because the secure payment site has minimal impact on the Description
Description
a threat
actor or
organization
can
be just as important
as
Note: Always factor timing does
into something
the threat prioritization assessment. When
organization’s operations and strategic interests due actor
to it may
still have
being in internal beta torganization,
esting. This also mean
why
or
how.
A
threat
no
desire
to
target
an
be just as important as why or how. A threat actor may have no desire to t
the risk associated with the attack ibut
s low because of the holiday,
secure payment site’s limited interaction with peop
since
it is a national
the
organization
becomes
a target
of
holiday, the organization becomes a target of opportunity for the actor to
Sub-element
Sub-element
Sub-element
Sub-element
opportunity
for
the
actor
to
test
a
new
tool
simply
because
none
of
its
and cyber footprint. Therefore, this threat, which initially appeared to be a high priority, now can be classif
security esecurity
mployees are at are
work. Description
Description
Description
Description
network
employees
at work.
as a medium to low threat requiring minimal analytical and network defense attention. Factor Example
Factor
Example
Factor
Example
Factor
Example•
5. Plot
threatsfor for eeach
on o
graphs
similar
to the following:
Plot all all
threats ach component
component n graphs similar to the following: Note: Always factor timing into the threat prioritization assessment. When a threat actor or organization does something Factor
i t i s a n
ational be just as important as Factor
why or how. A tFactor
hreat actor may have no dLikelihood esire to t arget an organization, bImpact ut since Example
Example
Example
(
(to organization)
holiday, the organization becomes a target of opportunity for t(by he tahreat ctor atctor)
o test a new tool simply because none of its netwo
Medium
Medium
High
High
security employees are at work. Strategic Indicators of Success
Capability
People
Interests
Examples of how assessing
Low
Medium
Low
Medium
threats according to this element
• Plot all threats for each component on graphs similar to the following: Factor
Example
and its sub-elements and factors
augments an analyst’s
cyber intelligence capabilities.
Intent
Operations
Risk Impact •(to oUse all three graphs to holistically valuate the overall cyber threat enviro
(by known ve
ulnerabilities)
rganization)
Likelihood (by threat actor)
Medium
High
3. Identify cyber threats using the three
core components
of a threat.
Strategic Interests
resources to the current and fMedium
uture cyber attacks that pose the most legit
Medium
High
High
Example: People
Low analysts Medium
If cyber intelligence rate all components of a threa
organization’s nCyber etwork servers for industrial espionage pur
Footprint
Operations
then the organization s
place (risk) as a high priority threat, Use allcyber three tgraphs
holistically evaluate
the overallalign cyberanalytical threat
• Use all three graphs to holistically evaluate the overall hreat toenvironment to efficiently and security
threat over others where the likelihood is toequally as high, b
Impact: Attack types - distributed denial-of-service
environment
to
efficiently
align
analytical
and
security
resources
the
resources to the current and future cyber attacks that pose the most legitimate threats to the organization. (DDoS), stealing intellectual property (IP), damaging/
current and future cyber attacks that pose the most legitimate threats to
Example: assets
incapacitating
network
the organization.
Overall Indicators of Success If cyber intelligence analysts rate all components of a threat actor executing a worm (likelihood) against an
Risk: Known vulnerabilities - High-profile employees,
Ifecyber
intelligence
analysts
rate
all tcomponents
threat
organization’s network servers or iExample:
ndustrial spionage purposes (impact) hat thhreats as no ofw
orm mitigation • fThreat prioritization influences which potential gaet addressed by isn ec
unpatched devices, unsecured remote access
actor
executing
a
worm
(likelihood)
against
an
organization’s
place (risk) as a high priority threat, then tahe resources re oarganization llocated. should immediately position itself to focus on thi
network servers for industrial espionage purposes (impact) that
threat over others where the likelihood is equally as high, but impact and risk is lower. has no worm mitigation in place (risk) as a high priority threat,
then the organization should immediately position itself to focus
Overall Indicators of Success on this threat over others where the likelihood is equally as high,
but impact and risk are lower.
get addressed by security operations and how network security • Threat prioritization influences which potential threats 4.4 Implementation resources Framework – Cyber
Prioritization
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE
are Threat
allocated. Capability
Examples: Likelihood: Threat
actors -Medium
State-sponsored,
Low
competitors, criminals, hactivists, recreational
Intent
hackers
Low
Medium
Overall Indicators of Success
• Threat prioritization influences which potential threats get addressed by
security operations and how network security resources are allocated.
• Collection management is streamlined and organizations are able
to better communicate their requirements to third party intelligence
vendors.
• Cyber threats are widely communicated to the organization and
employees are aware of the most relevant threats.
• Cyber threats are proactively monitored and prioritized, with updates
available to inform security operations, intelligence analysts, and
decision makers.
• Analytical production aligns with threat prioritization. For instance,
the organization develops a tiered system to communicate threat
information to stakeholders:
- Tier 1: Potential threat averages a high rating. Analysis required
within 90 minutes.
- Tier 2: Potential threat averages a medium rating. Analysis
required within 8 hours.
- Tier 3: Potential threat averages a low rating. Analysis required
between 3 and 5 days.
- Tier 4: Potential threat does not compute a rating, but is an
indirect threat for anyone using the Internet. No specific
timeframe for analysis.
• Analysts use threat prioritization to do predictive analysis, like
developing scenarios to test how defenses will react to the full spectrum
of cyber threats.
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE Implementation Framework – Cyber Threat Prioritization
4.5
Likelihood
Understanding the capabilities and intentions of cyber threat actors determines the likelihood of them targeting an organization. To determine this
likelihood, a CITP participant from industry monitored open source publications from an organization known to sponsor cyber threat actors who frequently
targeted the organization. Analyzing this accessible data provided insight into the motivations of the sponsored cyber threat actors, allowing the CITP
participant to narrow down the types of data likely to be targeted, and work with network security experts to create diversions, honey pots, and employ
other measures to proactively defend against the threat.
Likelihood
Capability
Intent
An actor’s sophistication, tools, and resources to execute
a cyber attack determine their capability. Assessing
capability as an independent variable of likelihood means
organizations can avoid the pitfalls of devoting time and
attention to “paper tiger” threats.
Attack Methods
Humans are creatures of habit. Although
threat actors take great care to avoid
detection, at some level they too succumb
to this adage. Tracking how threat actors
operate exposes patterns that analysts can
use to combat their effectiveness.
Infrastructure
Sophisticated threats often require
an infrastructure to operate. This
can be assessed by looking for hop
points used during an attack, the
command and control network, or
the size and scope of a botnet.
Technology
Technology used or manipulated for
an attack can indicate the capability
of a threat actor. More sophisticated
actors target SCADA or ICS devices,
web-enabled products, or mobile
devices in addition to traditional
servers and clients.
Coding
Nuances and personal preferences in
coding not only assist with
attribution, but also can indicate actor
sophistication.
Maturity
The maturity of the actor takes into
account their planning process,
pre-attack activities (research/
recon/social engineering), and post
attack actions (such as tool updates
or incorporating lessons learned).
Targets
Resources
Understanding what is available to threat
actors offers context to the sophistication
of their attacks. Leverage government,
industry, and intelligence service provider
information sharing arrangements to learn
about actors resources.
The actor’s purpose and the expected outcome of the cyber
attack determine the intent. Prioritizing actors by their intent
allows analysts to focus on the most relevant threats.
Motive
Why do threat actors attack? Determining
an actor’s motive provides insight into the
possible direction of their behavior, and
determines their interest in targeting the
organization.
Intrinsic (personally
rewarding)
Money
Obtaining and maintaining
capabilities incur costs. Wellresourced/sponsored threat actors
are often more dangerous than less
resourced actors, with other variables
being equal.
Fame, bragging rights, thirst for
knowledge/access, justification of
skills, satisfying boredom,
patriotism, and hactivist allegiance;
all reasons a hacker might be
motivated to target an organization.
People
Extrinsic (receive external
reward or avoid punishment)
From collaborators and co-workers
to teachers and mentors, the number
and type of people involved in a
campaign can be indicative of its
capability.
Extrinsic motives revolve around two
key concepts: reward or avoiding
punishment. These motives include
everything from state-sponsored
denial and deception operations,
misinformation campaigns, and
psychological operations to financial
incentives from competing
businesses, organized crime, and
blackmail.
Tools
Tools often hint at the capability of
an actor, but the lack of a custom
tool does not always imply a novice
attacker. Most sophisticated actors
will use the right tool for the job; if
open source tools will work, there is
no need to customize one.
Training
Targeted Data
Understanding what a threat actor is after
will factor into determining their intent to
target the organization.
Personally Identifiable
Information (PII)
Are the attackers stealing personal
information from your customers?
From your employees?
Determining if this type of
information is vulnerable can help
assess the likelihood that the actor
targets the organization.
Research and Development
Some actors exist to steal corporate
R&D data. Organizations with heavy
R&D missions are more likely to be
targeted by actors specializing in
corporate espionage or supporting
nation-states.
Business Process
Certain categories of actors,
especially insider threats, target the
inner workings of the organization.
From hiring and firing information to
time cards and audit findings,
organizations likely will be targeted
if this information is accessible.
Industrial Control Systems
The type and quality of training
available to the threat actor can help
determine their capability. Online
videos, IRC channels, certification
courses, military training, or formal
academic education all yield
different levels of sophistication.
Certain actors specialize in
compromising industrial control
systems and the associated
human-machine interface.
Organizations operating these
systems should prioritize these
threat actors accordingly.
Capability can be assessed by
looking at what is targeted.
Does the actor rely on mass phishing
emails, identify specific targets
(network, website, employee,
mobile platform) or exploit a specific
vulnerability (Adobe, Windows,
SQL, etc.)?
Indicators of Success
•
Analysts have a repository of current and historical threat actor tactics,
techniques, and procedures (TTPs) to generate profiles that are fed into data
collection platforms to separate known threats that automated defensive
actions can mitigate from unknown threats requiring an analyst’s attention.
•
Analysts understand threat actors’ intentions well enough to assign them to
different categories, such as nation-state, criminal, hactivist, recreational, or
competitor; enabling them to identify the most likely threats their organization
faces through profiling.
•
Analysts gain perspective on the tools threat actors use to assess how
they access an organization or if they outsource tool development. A basic
netflow analysis could show the majority of attacks come from well known,
prepackaged scripts, which analysts can easily combat using remediation
efforts posted on open source websites.
•
Analysts realize that if a threat actor is targeting their organization for
fame, the likelihood increases for the actor to choose a DDoS attack to the
organization’s website as the attack method.
•
From their organization being the first result in a Google search to knowing
over what holidays certain actors like to conduct attacks, analysts recognize
the importance of timing when it comes to assessing the overall likelihood of
a threat.
•
Analysts realize that sophisticated actors use the lowest common denominator
for attacks. If a threat actor can use an off-the-shelf tool to accomplish their
goal, they’ll wait to deploy customized tools on harder targets.
•
Analysts understand that the targeting of Adobe or Windows software
vulnerabilities usually equates to a threat of lower sophistication than one
targeting Windows operating systems.
4.6
Implementation Framework – Cyber Threat Prioritization
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE
Impact
Analyzing the effects cyber attacks have on an organization’s operations and strategic interests provides quantifiable, business-related information to
justify its impact on the organization. A CITP participant quantified the impact of cyber threats to their leadership by assessing how much money the
organization would pay to reroute its product distribution channels after a hacker compromised the network and disclosed specific travel routes to
competitors intent on disrupting this distribution.
Impact
Operations
Strategic Interests
Cyber attacks adversely affect an organization’s day-to-day
operations. Since the effects often are financially quantifiable, analysts can use dollar amounts to communicate the
impact attacks have on how an organization functions.
Direct Costs
Cyber attacks have a financial
impact on organizations. Prioritizing
threats according to their cost in
terms of remediation and mitigation can
resonate with technical and
non-technical stakeholders.
Incident Response
Consider the costs to perform an
investigation, remediation, and
forensics; including required software/
licenses for incident response tools.
Downtime
Business costs of a network-reliant
service being unavailable, including
missed transactions or loss of
potential revenue also play a role
Mitigation and/or Prevention
Factor in costs of additional
hardware/software required to
mitigate a specific threat.
Some impacts are harder to quantify, but they are no less
important. Strategic interests capture the intangible aspects
of the organization that can be affected by a cyber threat.
Business Operations
Organizational Interests
In addition to the known costs of
responding to an attack, organizations
also should consider the cascading
effects an attack can cause and their
associated costs.
Plans, people, and products offer
tremendous insight into why an
organization is targeted and where a
threat can do the most damage if certain
information is compromised.
Supply Chain
Costs associated with the inability
to meet demand, delay to
operations, and having to
supplement/replace suppliers can
significantly impact an organization.
Logistics
An organization must function
whether it is enduring an attack or
not, so make sure to consider the
cost of continuing operations during
and after an attack, such as
re-routing communications, securing
intellectual property, adding
equipment/personnel to avoid
another similar attack, and upgrading
systems/networks/processes.
Market/Industry
Consider the impact of losing
strategic vision data, such as annual
reports, 1/3/5 year strategic
outlooks, operational policies,
mergers, and acquisitions.
How are competitors affected by the
cyber threat? Is the industry equally
affected by the threat? Consider
national and foreign competition in
threat prioritization.
Stakeholders
Geopolitical
Organizational Culture
Factor in the impact of
legal/regulatory requirements from
governments, law enforcement,
regional entities (European Union),
and external business arrangements.
Also consider changes to the
organization's culture, including
work-from-home policies, complex
password requirements, and
restricted network access.
Loss of intellectual property may
reveal R&D investments or R&D
strategies, delay product releases,
affect future acquisitions, and cause
a loss of competitive advantage.
Organizations do not operate in a bubble,
and neither should threat prioritization.
Consider the ramifications cyber attacks
can have on organizational partnerships,
reputation, culture, geopolitics, and
market space.
Strategic Planning
Assess how threats impact
shareholders, board of directors,
and employees.
Future Earnings
External Interests
Does the threat affect political
relationships, or the ability to
operate in foreign countries? Will
the impact of the threat affect the
stock market? Is the local/regional
economy impacted? All of these
factors play a role that decision
makers will want information on.
Partnerships
Consider the impact to third parties,
including information-sharing
partners (government/industry/
service provider) and other business
relations (companies/governments/
regions). Assess the validity
of shared data if strategic partners
are affected.
Brand Reputation
Brand Reputation: Understand
the impact to the brand and its
implications on public opinion.
Indicators of Success
•
•
Internally, analysts establish frequent communication with the business
units responsible for operations to discuss threats, alter threat prioritization,
and predict new threats. These business units can include R&D, physical
security, risk management, IT, human resources, insider threat, and business
intelligence.
Analysts identify and remediate the cascading effects a cyber attack could
have by targeting one part of the organization’s operational network and
systems.
•
Analysts recognize how a cyber attack could impact the organization’s
ability to operate and communicate to stakeholders and institute appropriate
contingencies to eliminate this impact when an attack occurs in the future.
•
Knowledge of the impact cyber attacks can have on an organization’s
operations enables analysts to determine the financial costs to recover and
repair damage done by the threats that the analysts’ prioritization efforts deem
most likely to harm the organization.
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE •
Analysts ensure that threat prioritization isn’t based off personal biases or
those of decision makers, stakeholders, service providers, or the media.
•
Analysts correlate logs of IPs accessing the parts of their organization’s
website containing data on strategic planning and intellectual property with
known bad IPs to predict where threats will be concentrated now and in the
future.
•
Analysts understand the financial cost associated with a geopolitical event in
a country threatening their organization’s Internet presence in that market.
•
Analysts recognize that if peers in their industry and the organization’s
economic interests are being attacked, the likelihood of being targeted
increases and they take preventative measures to ensure that doesn’t happen.
Implementation Framework – Cyber Threat Prioritization
4.7
Risk
Assessing how people and the organization’s cyber footprint make the organization vulnerable to cyber attacks determines what areas within it are
the most at risk of being targeted. One CITP participant’s CEO is active with companies and institutes that are separate from the organization. The CITP
participant’s cyber intelligence analysts maintain an awareness of these activities, so when hacktivists publicly threatened attacks against one of the
institutes, the analysts knew this could have implications for their organization and altered network defenses to prepare for a potential attack.
Risk
People
Cyber Footprint
Cyber threats generally have one thing in common; at some
point a human interacts with the threat. This interaction must
be a part of threat prioritization to understand an attacker’s
most commonly targeted vulnerability: people.
Relevance
From leadership to rank-and-file employees,
the Internet offers a communication
platform that allows anyone to make their
organization more visible to threat actors.
Access
Employees with administrator privileges or
access to sensitive data are more attractive
targets for threat actors. Determining who
has what access can significantly aid in
identifying the risk to employees.
Online Presence
Maintain awareness of information
employees put online and their
popularity on blogs/social media—
both can garner the attention of
threat actors. Information posted
online can unwittingly reveal
vulnerabilities and flaws in security
policy, or incite threat actors to
target the organization.
Extracurricular Activities
Be mindful of the activities
employees participate in outside of
work. Employees’ status with
external institutions, such as
non-profits, may increase their risk
of being targeted.
Motive
There always is a rhyme or reason
for why people enable cyber attacks.
Whether it’s ignorance, financial
trouble, disgruntlement, or boredom,
by knowing these vulnerabilities
analysts can diminish their
effectiveness through prevention.
The greater an organization’s online exposure, the more
opportunity an attacker has to find vulnerabilities. Consider
the organization’s infrastructure, supply chain, online
exposure, and components most susceptible to attacks.
Infrastructure
The unknown provenance of software and
hardware complicates risk determination in
the cyber environment. Overcoming this
limitation requires researching where, when,
and how an organization’s infra-structure is
most susceptible to cyber threats.
Physical and Network-Based
Access
Develop a blueprint of where
network appliances, workstations,
and third party equipment connect to
the organization’s network and
identify the most likely risks for
cyber threat activities.
Software
Most organizations rely on software
to accomplish day-to-day operations.
A robust threat prioritization assesses
the risks associated with relying on
particular software, which network
users require access to high-risk
software, and the organization’s
ability to detect if a software
vulnerability has been exploited.
Position
As with access points, consider
how threat actors can exploit the
different roles people play
throughout the organization,
from network administrator or HR
representative to CEO, supply
chain manager, or a recently
fired employee.
Supply Chain
Abnormal Activity
The most stringent network
defenses can be subverted by
counterfeit equipment or software.
Understanding and assessing
threats to the organization’s supply
chain provides additional data points
to measure risk of compromise
through the organization’s
network infrastructure.
Develop baseline or expected
network behavior for key users.
Consider what deviations may
indicate potential nefarious activity
and consistently watch for them.
Some examples can involve an
employee working off-hours,
emailing attachments to personal
email accounts, or accessing
information that is unrelated to their
normal job.
The content and services an organization
provides on the Internet serve as attractive
targets for threat actors. Analysts can
assess severity of risk based on this insight
into likely attack vectors.
Website
Hardware
Individuals have varying access
to both physical and network-based
sections of an organization that threat
actors can leverage to execute an
attack. Assess which employees are at
higher risk of being targeted based on
their access.
Online Presence
Analyze how threat actors might
leverage an organization’s website
to plan and execute an attack.
This includes compromising
customer account log-ins, collecting
employee contact information,
defacing the site, or denying
legitimate access to it.
Additional Exposure
An organization’s public relations
and marketing departments track
how social media and other aspects
of the Internet help bring attention
to the organization. Threat
prioritization efforts also should
track how this attention affects its
cyber threat environment.
Additional Services
FTP, Telnet, VPN access, webmail,
remote desktop, and other
web-based services used by an
organization increase the risk of
potential cyber attacks, and should
be factored into threat prioritization.
Indicators of Success
•
Whether it is an employee alerting about a suspicious email they received
or a vendor providing a list of bad IPs, analysts have engaged enough with
individuals associated with the organization that they actively contact the
analysts about issues that could alter how threats are prioritized.
•
Employee feedback influences threat prioritization because analysts offer
feedback mechanisms via all of their cyber intelligence communication
platforms; emails, analytical products, briefings, or awareness campaigns.
•
If the CEO or a junior analyst blogs about topics that likely will bring the
attention of threat actors, analysts are aware of these activities and consider
the position, influence, popularity, and online presence of these individuals in
order to predict how they should change the organization’s security posture.
•
4.8
•
Analysts understand the organization’s operating environment well enough
that with system updates and patches, they alleviate ~80% of threats; freeing
them to focus on the ~20% that could significantly impact the organization.
•
Analysts recognize their organization is only as secure as its supply chain. If
it acquires software and analysts don’t know who did the actual coding, the
code’s reliability, or to what extent it has been error tested, then they won’t
know how threat actors could use potential vulnerabilities within the code to
conduct an attack.
•
Analysts incorporate timing into their prioritization efforts to align increases
in network defenses with the different times during the year (holidays, system
upgrades) when the organization’s network is most vulnerable.
Analysts become aware of the fact that every vulnerability is not a threat
worthy of further analysis and mitigation.
Implementation Framework – Cyber Threat Prioritization
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE
Download