ACTIONABLE
THREAT
INTELLIGENCE
Chandra Ballabh
Threat Intelligence Defined
 What isThreat
 What is Intelligence
 What isThreat Intelligence
 Actionable outcomes
Threat Intelligence Categorization
 TI can be categorized as
 Tactical:
 Offending IP addresses
 URLs
 Registry entries
 Hashes
 Strategic
 Business use cases
 Learning from past incidents
 Global trends
Effectiveness of Threat Intelligence
 Intelligence should strive to be timely
 Intelligence should strive to be accurate
 Intelligence should strive to be actionable
 Intelligence should strive to be relevant
Traditional Threat Intelligence Methods
 Mailers from security vendors
 Mailers from Government agencies
 Inputs from internal stakeholders
 Automated thread feed from security vendors
 Automated thread feed from open sources
Threat Intelligence Market Offerings
 Every security vendor offers some form of threat intelligence feed or other
 Next gen firewall
 Anti-APT
 Web proxy
 DLP Solution
 Email security gateway
 SIEM & SOAR
 UEBA solutions
 Threat hunting platforms
 Get a list of such services from http://thecyberthreat.com/cyber-threat-
intelligence-feeds/
Indicators of Compromise (IoC)
 IoC monitoring facilitatesThreat Intelligence capabilities-
 Unusual Outbound NetworkTraffic
 Anomalies In Privileged User Account Activity
 Mismatched Port-ApplicationTraffic
 Suspicious Registry or System File Changes
 WebTrafficWith Unhuman Behavior
 Signs of DDoS Activity
Commercial Threat Intelligence – Points to
Ponder
 UsingTI is tricky
– know to find grain from chaff is the key
 TI is often probabilistic and often context agnostic
– align it to your context
– determine the rules of when and when not to act
 TI is not an information for Senior Executives or Leaders
– only the actions and outcomes of usingTI are
 IntegratingTI feeds to SIEM is fraught with traps
Actionable Threat Intelligence
 Effective use of time and effort
 No additional validation
 Minimal manual intervention
 Relevant to the operations
 Action as per the context
 High accuracy
Threat Intelligence – SIEM Integration
Enhance your Threat Intelligence capability
 UseTI Solutions
 Follow CERT Organizations
 Subscribe to Security vendor alerts
 Integrate open source threat feeds with your security solutions
 Identify new threat patterns
 Monitor zero days
 Identify social engineering attacks (human is weak link)
 Adopt big data analytics
Summary
 TI is not new – We all do it
 TI can become noise – context sensitize it
 Know what you want to protect – select the relevant intelligence
 SIEM –TI integration is a staged process
 One size does not fit all – but one principle fits all
 Use what suits you
 ActionableThreat Intelligence is the key – use it wisely
Q & A

Actionable Threat Intelligence

  • 1.
  • 2.
    Threat Intelligence Defined What isThreat  What is Intelligence  What isThreat Intelligence  Actionable outcomes
  • 3.
    Threat Intelligence Categorization TI can be categorized as  Tactical:  Offending IP addresses  URLs  Registry entries  Hashes  Strategic  Business use cases  Learning from past incidents  Global trends
  • 4.
    Effectiveness of ThreatIntelligence  Intelligence should strive to be timely  Intelligence should strive to be accurate  Intelligence should strive to be actionable  Intelligence should strive to be relevant
  • 5.
    Traditional Threat IntelligenceMethods  Mailers from security vendors  Mailers from Government agencies  Inputs from internal stakeholders  Automated thread feed from security vendors  Automated thread feed from open sources
  • 6.
    Threat Intelligence MarketOfferings  Every security vendor offers some form of threat intelligence feed or other  Next gen firewall  Anti-APT  Web proxy  DLP Solution  Email security gateway  SIEM & SOAR  UEBA solutions  Threat hunting platforms  Get a list of such services from http://thecyberthreat.com/cyber-threat- intelligence-feeds/
  • 7.
    Indicators of Compromise(IoC)  IoC monitoring facilitatesThreat Intelligence capabilities-  Unusual Outbound NetworkTraffic  Anomalies In Privileged User Account Activity  Mismatched Port-ApplicationTraffic  Suspicious Registry or System File Changes  WebTrafficWith Unhuman Behavior  Signs of DDoS Activity
  • 8.
    Commercial Threat Intelligence– Points to Ponder  UsingTI is tricky – know to find grain from chaff is the key  TI is often probabilistic and often context agnostic – align it to your context – determine the rules of when and when not to act  TI is not an information for Senior Executives or Leaders – only the actions and outcomes of usingTI are  IntegratingTI feeds to SIEM is fraught with traps
  • 9.
    Actionable Threat Intelligence Effective use of time and effort  No additional validation  Minimal manual intervention  Relevant to the operations  Action as per the context  High accuracy
  • 10.
    Threat Intelligence –SIEM Integration
  • 11.
    Enhance your ThreatIntelligence capability  UseTI Solutions  Follow CERT Organizations  Subscribe to Security vendor alerts  Integrate open source threat feeds with your security solutions  Identify new threat patterns  Monitor zero days  Identify social engineering attacks (human is weak link)  Adopt big data analytics
  • 12.
    Summary  TI isnot new – We all do it  TI can become noise – context sensitize it  Know what you want to protect – select the relevant intelligence  SIEM –TI integration is a staged process  One size does not fit all – but one principle fits all  Use what suits you  ActionableThreat Intelligence is the key – use it wisely
  • 13.