The Nen-Book
LinkedinTwitterMediumGithubHTB
  • Whoami
  • Walkthroughs & Writeups
    • My CTF Methodology
    • Hack The Box Machines
      • Administrator
      • Escape two
      • Cicada
      • HTB Permx Machine(CVE-2023–4220 Chamilo LMS)
    • Intigriti 1337Up 2024
      • Intigriti 1337Up 2024-CTF OSINT Challenges
      • Intigriti 1337Up Live 2024-CTF Web Challenges
    • CyCTF Quals 2024
      • OSINT Challenges CyCTF Quals 2024
      • Old Friend OSINT Challenge CyCTF 2024 Quals Writeup
    • PicoCTF
      • PicoCTF 2024 Web Exploitation Challenges
      • PicoCTF 2024 General Skills Challenges
      • PicoCTF 2021 Web Exploitation Challenges Walkthrough
      • PicoCTF 2019 Web Exploitation Challenges
  • Web_AppSec
    • Web_Recon
    • SQli
    • ATO
    • Backend_Technology_Tricks
    • XSS
    • SSRF
    • CSRF
    • XXE
    • SSTI
    • Insecure_Deserialization
    • Open_Redirects
    • Information_Disclosures
    • Rate_Limiting
    • Clickjacking
    • Broken Access Control & IDORS
    • Bash_Scripting
    • Authentication_Vulnerabilities
    • App_Logic_Errors
  • Network & AD Pentesting
    • Scanning & Enumeration
    • Active_Directory
      • AD_Overview_&_ Lab Build
      • AD_Initial_Attack_Vectors
      • AD_Post-Compromise_Enumeration
      • AD_Post-Compromise_Attacks
    • Buffer_Overflow_Attacks
    • Web_Applications
    • Privilege_Escalation
  • Cloud_Security
    • AWS Pentesting
  • APISec
    • API_Recon
    • Broken_Access_Control & Info_Leaks
  • Code_Review
    • Source_Code_Review_101
    • Code Review Tools
  • Bug_Hunting
    • Picking_A_BugBounty_Program
    • Writing_A_Good_Report
  • MITRE ATT&CK
    • Introducing the ATT&CK Framework
    • MITRE Engenuity
    • Threat-Informed Defense
Powered by GitBook
On this page
  • First Cyber Threat Intelligence Analysis
  • MITRE CRITS
  • Defensive Engagement of the Threat
  • Focused Sharing and Collaboration

Was this helpful?

Edit on GitHub
  1. MITRE ATT&CK

Threat-Informed Defense

The concept of Threat Informed Defense is a proactive approach to cyber security that utilizes three elements to provide an evolving feedback loop to your security team:

  • Cyber threat intelligence analysis

  • Defensive engagement of the threat

  • Focused sharing and collaboration

First Cyber Threat Intelligence Analysis

A threat-informed defense first begins with being threat-informed and being informed requires threat intelligence. from that point you are able to understand who is likely to attack you and how they are likely to do it. This information gives you the basis for your defenses.

so the Threat Intelligence Analysis is taking existing intelligence data like TTPs, malware hashes, or domain names, and applying human intelligence to harden cyber defenses. This improves ways to anticipate, prevent, detect, and respond to cyber-attacks.

let’s take a CRITS as an example of what is going into cyber threat Intelligence analysis

MITRE CRITS

CRITs is a free, open-source tool designed for analysts and security professionals working on threat defense. its main goal is to offer an adaptable and open platform for analyzing and collaborating on threat data.

it does a handful of things that assist with intelligence analysis such as:

  • Collecting and archiving attack artifacts

  • Associating artifacts with stages of the cyber attack lifecycle

  • Conducting malware reverse engineering

  • Tracking environmental influences

  • Connecting all of this together to shape and prioritize defenses and react to incidents

moving forward to the second element which is

Defensive Engagement of the Threat

Defensive Engagement of the Threat takes what you’ve learned from Intelligence Analysis and allows you to look for indicators of a pending, active, or successful cyber attack.

Breach and Attack Simulation (BAS) tools fit in well here because they take the behavioral models uncovered during intel analysis and use to allow you to automate testing and reporting on what those behavior patterns look like in our enterprise.

These simulation results feed back into your Threat Intelligence Analysis and into the next

element we’re going to talk about: Focused Sharing and Collaboration.

Focused Sharing and Collaboration

By sharing threat actor TTPs through standards such as STIX and TAXII, the security community benefits together.

If you are part of a large organization with different security groups, information shared between groups in a standard format can help your enterprise build a threat informed defense.

Groups like MITRE’s Center for Threat Informed Defense (CTID) bring together sophisticated security teams from leading organizations around the world to expand the global understanding of adversary behaviors. They accomplish this by creating focus, collaboration, and coordination to accelerate innovation in threat-informed defense, building on the MITRE ATT&CK framework.

PreviousMITRE Engenuity

Last updated 8 months ago

Was this helpful?

we used CRITs here as an example, it gives us a good illustration of what the features of cyber threat intelligence are for more info about

CRITs