Click here to close now.

Welcome!

Web 2.0 Authors: Stackify Blog, Liz McMillan, Elizabeth White, Pat Romanski, Dana Gardner

Blog Feed Post

What is a Threat Intelligence Platform

Last week, Anton Chuvakin from Gartner wrote a blog about what he is calling an Intelligence Management Platform. He includes some thoughts by Facebook on how they are building their own platform.  He alludes to non-public sources and I’m sure ThreatConnect™ is one, so rather than keep you all in suspense, I thought this would be an opportune time for ThreatConnect to say what we think a Threat Intelligence Platform is.

Rick Holland from Forrester said recently at a SANS conference that the threat intelligence platform is like the quarterback of your operations. The threat intelligence platform should be calling the shots and running the show.

There is also talk of how Threat Intelligence Platforms and Incident Response platforms are emerging into two distinct products.  I do not think that they should be, rather I believe that the pursuit of truly understanding security of the business will result in a single converged product category. You can’t have a football team with two quarterbacks on the field, and you can’t have two different platforms responsible for managing your threat intelligence and response activities.

I’m not sure what the industry will settle on as far as a name given the now extended scope of requirements, but whatever the name becomes, I believe the requirements are now well understood.

What is the Problem and Why Now?

Throughout the enterprise there are security personnel using a variety of processes and tools to conduct their incident response, network defense, and threat analysis.  Integration between teams supporting these functions and management have to this point been mostly manual efforts.

Unless they had vast resources to build a proper platform, security team efforts haven’t been integrated, or are integrated but through rudimentary technologies like email, spreadsheets, or maybe a SharePoint portal or a ticketing system.   These techniques, although better than nothing, do not scale as the team grows and the number of malicious events and security processes increases. We saw this same problem with other parts of the business, and platforms were created to support them in their quest for automation and better management processes.  For example, PeopleSoft for human resources, Salesforce for sales, Intuit for finance, SAP for manufacturing, and Eloqua for marketing.

Due to the ever-increasing threat of cyber attack and regulatory pressures there is a need for a new type of enterprise platform that can support the entire security team from the CIO to the personnel spanning processes for incident response, network defense, and threat analysis.  The platform must be used for tactical day-to-day blocking and tackling as well as strategic decision-making and process improvement.

What is a Threat Intelligence Platform?

A Threat Intelligence Platform permits personnel throughout the enterprise to manage processes on the security relevant data that they care about. Other personnel processes can be integrated on top of that same data simultaneously as part of the same or a different process.  Processes might include triaging events in the SOC, conducting incident response, or the threat team’s processes for integrating external feeds or intelligence.  From the management perspective, the platform must present trends, supply real-time updates, as well as support threat-driven long-term prioritization across the business. The platform must support the integration of all the stakeholders and data that is relevant to each in a way where they can work together as a team.  Customization of the platform is key, as each organization will have different processes, and data customizations needs across processes for aggregation, analysis, and action.

Aggregation – From Feeds to Intelligence

The culmination of one or more feeds is not sufficient on its own; instead you need to focus on processing your own data then overlay what everyone else knows on top of that.   Without this type of understanding you never know what is truly relevant to your organization.

There is a lot of emphasis on feeds in the marketplace right now.  How many feeds do you support and which ones? Can you support structured and unstructured data input?  Do you support STIX? What is the process (manual, automated, semi-automated) to get it into the system? Do you support API level integrations? Although these things are important, I would attest that these questions are just the beginning, and the easy part of the question.

Instead, we need to be thinking bigger and considering how incoming feeds will be made relevant and how they will support the various processes and stakeholders throughout the business that will use them in different ways. Incoming feed data must be correlated with the organization’s knowledge base, and tailored to meet the needs of the different stakeholders – from security team personnel to management and beyond.  Automation of processing feeds will be critical so that you can avoid overwhelming your staff with mundane data processing. Even with automation, you will need to support human processing on feed data to ensure its usefulness.  This will require analysis process support as described below.

Finally, the feedback loop will be critical in order to support the processes of evaluating the feeds you are using.  This will allow internal events to highlight what feed sources are most applicable to the organization, and what types of data have the most usefulness.

Analysis – Where the Rubber Meets the Road

Analysis is a core feature of the Threat Intelligence Platform and it needs to automate as much of the processing as is technically possible.  This requires the platform to be built with data management in mind and automation can’t be an afterthought. ThreatConnect leverages the Diamond Model for Intrusion Analysis as its foundation for making sense of the dataset.  This is not a data structure, as ThreatConnect allows each customer to extend their data structures to meet their own unique needs, but instead is a powerful baked-in methodology that allows the platform to make sense of the dataset.

Here are three use-cases that are typically done by ThreatConnect customers.  Although I’m discussing three different teams in them, the productivity gains provided by the platform are even more apparent with more limited resources.

  • Collections – The organization is receiving feeds, tippers, community-derived intelligence, and possibly detection signatures from a variety of sources. They input all of this incoming data into ThreatConnect, triage its priority, and conduct processing to make it actionable.   If the data already exists, the system can add additional context derived by the new source. If the data is new, ThreatConnect may assign initial priorities based on relations to already known threats or previously observed activity.  Depending on the data type and integration, and the organization’s policy, processing for action can be completely automated at various thresholds (detect-only, block, report, etc.).   Signature management is made simple through the process of automatically associating new feed indicators and context with already present signatures that have been previously associated with the same indicator, while any new indicators can be put into a process for signature creation.
  • SOC – The SOC supplies the threat team with potential indicators of compromise via ThreatConnect. The threat team analyzes the indicators to provide additional context by leveraging data service integrations within ThreatConnect such as passive DNS and Reverse Whois tracking, and provides more indicators back to the SOC to search for in their logs.  Like in the first use case, this process can be automated through integrations with SIEM or other network defense. This iterates until a point where no more information can be gleaned and the process is completed.
  • Incident Response – The IR team processes an incident within ThreatConnect.  Throughout the process, incident data is automatically associated with existing knowledge and potentially previous courses of action created during previous incident response activities or by the threat team based on their own proactive efforts.  Throughout the process, asking for assistance is as easy as creating a task and assigning it to another team member.

Although redundant for each use case, there are several common analysis requirements supported through the platform.

  • The ability for each ThreatConnect customer to customize the platform to meet his or her needs for data storage, management, and processing.   This includes customizing data elements requiring storage and management, processes across various teams, as well as the input fields that help staff more quickly support data entry tasks.
  • ThreatConnect will create new data, enrich current data, and/or make associations across the existing dataset.  This allows the team to work collectively from the same knowledgebase, create more accurate data, and become more productive throughout all their processes.
  • Using the ThreatConnect discussions feature allows collaboration across all processes, tasks, and even supports collaboration at the atomic indicator level.  The ability to collaborate is essential as teams become larger and more geographically disparate.  With the follow feature you can be alerted during or after a process is completed if anything changes.
  • Using ThreatConnect workflow, the organization’s process is streamlined and tracked through completion. The ability to do postmortem inspection allows you to continually improve your processes.
  • ThreatConnect cloud customers can leverage our Analyst On-Demand feature to seek virtual assistance for one task or across an entire process.

Action – The Pieces Come Together

Integrations are a key requirement of a Threat Intelligence Platform. Whether the integration leverages threat intelligence collected and analyzed from a feed, or new context found during a SOC event or incident response activity; data from the platform needs to make its way back into the products your organization uses to automate your organizations protection.  By shortening the timeframe from aggregation, analysis processes, to action with automated integration, you can speed up the processes for detection and protection.

Use-cases with the ThreatConnect Platform:

  • Signature Management – Customer defined processes for signature (currently snort, YARA, BRO, OpenIOC, clamAV, CybOX, Suricata) creation, approval, and installation.
  • Context specific Watchlists – The process of creating tailored feeds of malicious indicators to hunt for and integrating them into a variety of SIEMs or other products based on common threats, exploits, or other areas of concern.
  • Block Approvals – There are a variety of ways to approve malicious indicators for blocking.  Depending on the source, rating, or relevancy to your business, the system can approve blocks or submit them for human approval.
  • Subsequent Analysis – Sometimes you need to look for the needle in the haystack or allow external partners access to the data for their analysis. API integration with third party data analysis tools allows customers to conduct further analysis.  Sharing with external parties may also create its own cycle of sharing and receiving back threat intelligence, so easily extracting data in a structured format has proven an important capability.

But that isn’t where it should stop, as described in the SOC and IR processes, response processing should also be done within the platform as well. To truly realize the potential of the platform, threat intelligence-derived events should be communicated back to the platform as internally derived intelligence for automated association and subsequent processing. This would allow you to prioritize your response based on the risk of the unknown event (based on existing data) and shorten the timeframes for processing of true threats to your network. This also can serve a prioritization scheme for budget approval of threat intelligence feeds that are most relevant to your business.

Conclusion

In order for threat data to be threat intelligence it has to be relevant. In the world of network defense, this means it must be relevant to the threats that your organization faces. For this reason it does not make sense to separate incident response and threat analysis processes or teams into separate platform environments. Doing so would be needlessly segmenting internal intelligence gleaned from incident response and external intelligence from research and indicator feeds. By pulling all your stakeholders and data into a single enterprise security platform you can make everyone more productive, make better decisions, and begin to automate the processes of detecting and responding to cyber threats in a more comprehensive way.

 

The post What is a Threat Intelligence Platform appeared first on ThreatConnect - Threat Intelligence.

Read the original blog entry...

More Stories By Adam Vincent

Adam is an internationally renowned information security expert and is currently the CEO and a founder at Cyber Squared Inc. He possesses over a decade of experience in programming, network security, penetration testing, cryptography design & cryptanalysis, identity and access control, and a detailed expertise in information security. The culmination of this knowledge has led to the company’s creation of ThreatConnect™, the first-of-its-kind threat intelligence platform. He currently serves as an advisor to multiple security-focused organizations and has provided consultation to numerous businesses ranging from start-ups to governments, Fortune 500 organizations, and top financial institutions. Adam holds an MS in computer science with graduate certifications in computer security and information assurance from George Washington University. Vincent lives in Arlington, VA with his wife, two children, and dog.

@ThingsExpo Stories
SOA Software has changed its name to Akana. With roots in Web Services and SOA Governance, Akana has established itself as a leader in API Management and is expanding into cloud integration as an alternative to the traditional heavyweight enterprise service bus (ESB). The company recently announced that it achieved more than 90% year-over-year growth. As Akana, the company now addresses the evolution and diversification of SOA, unifying security, management, and DevOps across SOA, APIs, microservices, and more.
After making a doctor’s appointment via your mobile device, you receive a calendar invite. The day of your appointment, you get a reminder with the doctor’s location and contact information. As you enter the doctor’s exam room, the medical team is equipped with the latest tablet containing your medical history – he or she makes real time updates to your medical file. At the end of your visit, you receive an electronic prescription to your preferred pharmacy and can schedule your next appointment.
The Open Compute Project is a collective effort by Facebook and a number of players in the datacenter industry to bring lessons learned from the social media giant's giant IT deployment to the rest of the world. Datacenters account for 3% of global electricity consumption – about the same as all of Switzerland or the Czech Republic -- according to people I met at the recent Open Compute Summit in San Jose. With increasing mobility at the edge of the cloud and vast new dataflows being predicted with the growth of the Internet of Things (and The Coming Age of Many Zettabytes) in the near...
GENBAND has announced that SageNet is leveraging the Nuvia platform to deliver Unified Communications as a Service (UCaaS) to its large base of retail and enterprise customers. Nuvia’s cloud-based solution provides SageNet’s customers with a full suite of business communications and collaboration tools. Two large national SageNet retail customers have recently signed up to deploy the Nuvia platform and the company will continue to sell the service to new and existing customers. Nuvia’s capabilities include HD voice, video, multimedia messaging, mobility, conferencing, Web collaboration, deskt...
The list of ‘new paradigm’ technologies that now surrounds us appears to be at an all time high. From cloud computing and Big Data analytics to Bring Your Own Device (BYOD) and the Internet of Things (IoT), today we have to deal with what the industry likes to call ‘paradigm shifts’ at every level of IT. This is disruption; of course, we understand that – change is almost always disruptive.
SYS-CON Events announced today that Cisco, the worldwide leader in IT that transforms how people connect, communicate and collaborate, has been named “Gold Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Cisco makes amazing things happen by connecting the unconnected. Cisco has shaped the future of the Internet by becoming the worldwide leader in transforming how people connect, communicate and collaborate. Cisco and our partners are building the platform for the Internet of Everything by connecting the...
Temasys has announced senior management additions to its team. Joining are David Holloway as Vice President of Commercial and Nadine Yap as Vice President of Product. Over the past 12 months Temasys has doubled in size as it adds new customers and expands the development of its Skylink platform. Skylink leads the charge to move WebRTC, traditionally seen as a desktop, browser based technology, to become a ubiquitous web communications technology on web and mobile, as well as Internet of Things compatible devices.
SYS-CON Events announced today that robomq.io will exhibit at SYS-CON's @ThingsExpo, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. robomq.io is an interoperable and composable platform that connects any device to any application. It helps systems integrators and the solution providers build new and innovative products and service for industries requiring monitoring or intelligence from devices and sensors.
SYS-CON Media announced today that @WebRTCSummit Blog, the largest WebRTC resource in the world, has been launched. @WebRTCSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @WebRTCSummit Blog can be bookmarked ▸ Here @WebRTCSummit conference site can be bookmarked ▸ Here
Docker is an excellent platform for organizations interested in running microservices. It offers portability and consistency between development and production environments, quick provisioning times, and a simple way to isolate services. In his session at DevOps Summit at 16th Cloud Expo, Shannon Williams, co-founder of Rancher Labs, will walk through these and other benefits of using Docker to run microservices, and provide an overview of RancherOS, a minimalist distribution of Linux designed expressly to run Docker. He will also discuss Rancher, an orchestration and service discovery platf...
Sonus Networks introduced the Sonus WebRTC Services Solution, a virtualized Web Real-Time Communications (WebRTC) offer, purpose-built for the Cloud. The WebRTC Services Solution provides signaling from WebRTC-to-WebRTC applications and interworking from WebRTC-to-Session Initiation Protocol (SIP), delivering advanced real-time communications capabilities on mobile applications and on websites, which are accessible via a browser.
SYS-CON Events announced today that Aria Systems, the leading innovator in recurring revenue, has been named “Bronze Sponsor” of SYS-CON's @ThingsExpo, which will take place on June 9–11, 2015, at the Javits Center in New York, NY. Proven by the world’s most demanding enterprises, including AAA NCNU, Constant Contact, Falck, Hootsuite, Pitney Bowes, Telekom Denmark, and VMware, Aria helps enterprises grow their recurring revenue businesses. With Aria’s end-to-end active monetization platform, global brands can get to market faster with a wider variety of products and services, while maximizin...
SYS-CON Events announced today that Vitria Technology, Inc. will exhibit at SYS-CON’s @ThingsExpo, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Vitria will showcase the company’s new IoT Analytics Platform through live demonstrations at booth #330. Vitria’s IoT Analytics Platform, fully integrated and powered by an operational intelligence engine, enables customers to rapidly build and operationalize advanced analytics to deliver timely business outcomes for use cases across the industrial, enterprise, and consumer segments.
SYS-CON Events announced today that Akana, formerly SOA Software, has been named “Bronze Sponsor” of SYS-CON's 16th International Cloud Expo® New York, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. Akana’s comprehensive suite of API Management, API Security, Integrated SOA Governance, and Cloud Integration solutions helps businesses accelerate digital transformation by securely extending their reach across multiple channels – mobile, cloud and Internet of Things. Akana enables enterprises to share data as APIs, connect and integrate applications, drive part...
The WebRTC Summit 2014 New York, to be held June 9-11, 2015, at the Javits Center in New York, NY, announces that its Call for Papers is open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 16th International Cloud Expo, @ThingsExpo, Big Data Expo, and DevOps Summit.
SYS-CON Events announced today that Solgenia will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY, and the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Solgenia is the global market leader in Cloud Collaboration and Cloud Infrastructure software solutions. Designed to “Bridge the Gap” between Personal and Professional Social, Mobile and Cloud user experiences, our solutions help large and medium-sized organizations dr...
SYS-CON Events announced today that Liaison Technologies, a leading provider of data management and integration cloud services and solutions, has been named "Silver Sponsor" of SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York, NY. Liaison Technologies is a recognized market leader in providing cloud-enabled data integration and data management solutions to break down complex information barriers, enabling enterprises to make smarter decisions, faster.
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
SYS-CON Events announced today that CommVault has been named “Bronze Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY, and the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. A singular vision – a belief in a better way to address current and future data management needs – guides CommVault in the development of Singular Information Management® solutions for high-performance data protection, universal availability and sim...
Cloud is not a commodity. And no matter what you call it, computing doesn’t come out of the sky. It comes from physical hardware inside brick and mortar facilities connected by hundreds of miles of networking cable. And no two clouds are built the same way. SoftLayer gives you the highest performing cloud infrastructure available. One platform that takes data centers around the world that are full of the widest range of cloud computing options, and then integrates and automates everything. Join SoftLayer on June 9 at 16th Cloud Expo to learn about IBM Cloud's SoftLayer platform, explore se...