diff --git a/docs/gettingstarted.rst b/docs/gettingstarted.rst index c27f9bf..61dcf0c 100644 --- a/docs/gettingstarted.rst +++ b/docs/gettingstarted.rst @@ -52,10 +52,10 @@ Threat-Informed Defense is complementary to other cybersecurity programs, such a In Threat-Informed Defense, all those functions can be threat-informed to varying degrees and in different ways. Some specific examples for each phase of the NIST CSF are provided below: * Identify: Inform understanding of risk and risk measurement based on an informed understanding of particular adversaries that are known to target a specific industry, geographical area, or technology by leveraging the ATT&CK Workbench [#f6]_ or Sightings [#f7]_. -* Protect: Prioritizing patch deployment based on the probability that a relevant adversary will exploit the related vulnerability on an organization’s systems is an example of threat-informed protection. An excellent example of threat informed protection is the Exploit Prediction Scoring System (EPSS) [#f6]_ which prioritizes vulnerabilities based on the probability that they will be exploited based on real-world exploitation information. -* Detect: Detection is greatly enhanced by being threat informed. Without a knowledge of the threat, detection must rely on statistical deviations from a baseline, or on allow-listing. Unfortunately, most networks have such large variation in their baseline activity that it is relatively easy for adversaries to “hide” in the noise, and difficult for analysts to filter out false positives. Most detection is already threat-informed to some extent by at least leveraging feeds of “known-malicious” indicators of compromise such as domain names or malware signatures, which are easier for an adversary to change compared to TTPs. To improve those detections, a more advanced threat-informed defense would leverage deep insight into the underlying and difficult-to-avoid behaviors that are core to malicious activity. This concept is well-documented in SpecterOps’ blog series [#f7]_, MITRE’s TTP-Based Hunting [#f8]_ , and the Center’s Summiting the Pyramid [#f9]_ work. +* Protect: Prioritizing patch deployment based on the probability that a relevant adversary will exploit the related vulnerability on an organization’s systems is an example of threat-informed protection. An excellent example of threat informed protection is the Exploit Prediction Scoring System (EPSS) [#f8]_ which prioritizes vulnerabilities based on the probability that they will be exploited based on real-world exploitation information. +* Detect: Detection is greatly enhanced by being threat informed. Without a knowledge of the threat, detection must rely on statistical deviations from a baseline, or on allow-listing. Unfortunately, most networks have such large variation in their baseline activity that it is relatively easy for adversaries to “hide” in the noise, and difficult for analysts to filter out false positives. Most detection is already threat-informed to some extent by at least leveraging feeds of “known-malicious” indicators of compromise such as domain names or malware signatures, which are easier for an adversary to change compared to TTPs. To improve those detections, a more advanced threat-informed defense would leverage deep insight into the underlying and difficult-to-avoid behaviors that are core to malicious activity. This concept is well-documented in SpecterOps’ blog series [#f9]_, MITRE’s TTP-Based Hunting [#f10]_ , and the Center’s Summiting the Pyramid [#f11]_ work. * Respond: Responders who understand adversary campaigns and behaviors more deeply can uncover the broader picture of malicious activity in their network and take more effective responsive action. For example, a quick isolation response to the first piece of malware discovered might only alert the adversary to being discovered and cause them to adjust accordingly and evade further detection, whereas a broader understanding of the adversary’s intentions, capabilities, and previous campaigns might lead the responders to investigate further, discover other likely targets within the network, identify crucial chokepoints in the adversary’s intrusion, and take a more decisive action in evicting the adversary. -* Recover: Organizations can validate their backup and recovery plans by testing themselves against realistic adversary tradecraft using the Adversary Emulation Library [#f10]_ or Micro Emulation Plans [#f11]_. These are particularly valuable for testing recovery in ransomware scenarios +* Recover: Organizations can validate their backup and recovery plans by testing themselves against realistic adversary tradecraft using the Adversary Emulation Library [#f12]_ or Micro Emulation Plans [#f13]_. These are particularly valuable for testing recovery in ransomware scenarios The CSF is primarily focused on an understanding of the systems being defended and general best-practices for cybersecurity. A Threat-Informed Defense complements that with knowledge of adversary tactics, techniques, procedures, tools, tradecraft, and intentions. This Threat-Informed Defense model is not intended to replace frameworks such as the CSF but to document how to incorporate threat information into the relevant components of a full cybersecurity program. For that reason, a high score in this model indicates that threat knowledge is being optimally utilized to guide defensive investments and actions. @@ -72,10 +72,10 @@ The CSF is primarily focused on an understanding of the systems being defended a .. [#f5] https://www.nist.gov/cyberframework .. [#f6] https://mitre-engenuity.org/cybersecurity/center-for-threat-informed-defense/our-work/attck-workbench/ .. [#f7] https://mitre-engenuity.org/cybersecurity/center-for-threat-informed-defense/our-work/sightings-ecosystem/ -.. [#f6] https://www.first.org/epss/ -.. [#f7] https://posts.specterops.io/capability-abstraction-fbeaeeb26384 -.. [#f8] https://www.mitre.org/sites/default/files/2021-11/prs-19-3892-ttp-based-hunting.pdf -.. [#f9] https://center-for-threat-informed-defense.github.io/summiting-the-pyramid/ -.. [#f10] https://mitre-engenuity.org/cybersecurity/center-for-threat-informed-defense/adversary-emulation-library/ -.. [#f11] https://mitre-engenuity.org/cybersecurity/center-for-threat-informed-defense/our-work/micro-emulation-plans/ +.. [#f8] https://www.first.org/epss/ +.. [#f9] https://posts.specterops.io/capability-abstraction-fbeaeeb26384 +.. [#f10] https://www.mitre.org/sites/default/files/2021-11/prs-19-3892-ttp-based-hunting.pdf +.. [#f11] https://center-for-threat-informed-defense.github.io/summiting-the-pyramid/ +.. [#f12] https://mitre-engenuity.org/cybersecurity/center-for-threat-informed-defense/adversary-emulation-library/ +.. [#f13] https://mitre-engenuity.org/cybersecurity/center-for-threat-informed-defense/our-work/micro-emulation-plans/