Skip to content

Commit

Permalink
Fixing three inline hyperlinks
Browse files Browse the repository at this point in the history
  • Loading branch information
forrestcarver authored Feb 29, 2024
1 parent 254e7bd commit 9741e92
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions docs/gettingstarted.rst
Original file line number Diff line number Diff line change
Expand Up @@ -53,9 +53,9 @@ In Threat-Informed Defense, all those functions can be threat-informed to varyin

* **Identify**: Inform understanding of risk and risk measurement based on an informed understanding of particular adversaries that are known to target a specific industry, geographical area, or technology by leveraging the `ATT&CK Workbench <https://mitre-engenuity.org/cybersecurity/center-for-threat-informed-defense/our-work/attck-workbench/>`_ or `Sightings <https://mitre-engenuity.org/cybersecurity/center-for-threat-informed-defense/our-work/sightings-ecosystem/>`_.
* **Protect**: Prioritizing patch deployment based on the probability that a relevant adversary will exploit the related vulnerability on an organization’s systems is an example of threat-informed protection. An excellent example of threat informed protection is the `Exploit Prediction Scoring System (EPSS) <https://www.first.org/epss/>`_ which prioritizes vulnerabilities based on the probability that they will be exploited based on real-world exploitation information.
* **Detect**: Detection is greatly enhanced by being threat informed. Without a knowledge of the threat, detection must rely on statistical deviations from a baseline, or on allow-listing. Unfortunately, most networks have such large variation in their baseline activity that it is relatively easy for adversaries to “hide” in the noise, and difficult for analysts to filter out false positives. Most detection is already threat-informed to some extent by at least leveraging feeds of “known-malicious” indicators of compromise such as domain names or malware signatures, which are easier for an adversary to change compared to TTPs. To improve those detections, a more advanced threat-informed defense would leverage deep insight into the underlying and difficult-to-avoid behaviors that are core to malicious activity. This concept is well-documented in SpecterOps’ `Capability Abstraction blog series <https://posts.specterops.io/capability-abstraction-fbeaeeb26384>`_, MITRE’s 'TTP-Based Hunting <https://www.mitre.org/sites/default/files/2021-11/prs-19-3892-ttp-based-hunting.pdf>`_, and the Center’s `Summiting the Pyramid <https://center-for-threat-informed-defense.github.io/summiting-the-pyramid/>`_ work.
* **Detect**: Detection is greatly enhanced by being threat informed. Without a knowledge of the threat, detection must rely on statistical deviations from a baseline, or on allow-listing. Unfortunately, most networks have such large variation in their baseline activity that it is relatively easy for adversaries to “hide” in the noise, and difficult for analysts to filter out false positives. Most detection is already threat-informed to some extent by at least leveraging feeds of “known-malicious” indicators of compromise such as domain names or malware signatures, which are easier for an adversary to change compared to TTPs. To improve those detections, a more advanced threat-informed defense would leverage deep insight into the underlying and difficult-to-avoid behaviors that are core to malicious activity. This concept is well-documented in SpecterOps’ `Capability Abstraction blog series <https://posts.specterops.io/capability-abstraction-fbeaeeb26384>`_, MITRE’s `TTP-Based Hunting <https://www.mitre.org/sites/default/files/2021-11/prs-19-3892-ttp-based-hunting.pdf>`_, and the Center’s `Summiting the Pyramid <https://center-for-threat-informed-defense.github.io/summiting-the-pyramid/>`_ work.
* **Respond**: Responders who understand adversary campaigns and behaviors more deeply can uncover the broader picture of malicious activity in their network and take more effective responsive action. For example, a quick isolation response to the first piece of malware discovered might only alert the adversary to being discovered and cause them to adjust accordingly and evade further detection, whereas a broader understanding of the adversary’s intentions, capabilities, and previous campaigns might lead the responders to investigate further, discover other likely targets within the network, identify crucial chokepoints in the adversary’s intrusion, and take a more decisive action in evicting the adversary.
* **Recover**: Organizations can validate their backup and recovery plans by testing themselves against realistic adversary tradecraft using the 'Adversary Emulation Library <https://mitre-engenuity.org/cybersecurity/center-for-threat-informed-defense/adversary-emulation-library/>`_ or 'Micro Emulation Plans <https://mitre-engenuity.org/cybersecurity/center-for-threat-informed-defense/our-work/micro-emulation-plans/>`_. These are particularly valuable for testing recovery in ransomware scenarios
* **Recover**: Organizations can validate their backup and recovery plans by testing themselves against realistic adversary tradecraft using the `Adversary Emulation Library <https://mitre-engenuity.org/cybersecurity/center-for-threat-informed-defense/adversary-emulation-library/>`_ or `Micro Emulation Plans <https://mitre-engenuity.org/cybersecurity/center-for-threat-informed-defense/our-work/micro-emulation-plans/>`_. These are particularly valuable for testing recovery in ransomware scenarios

The CSF is primarily focused on an understanding of the systems being defended and general best-practices for cybersecurity. A Threat-Informed Defense complements that with knowledge of adversary tactics, techniques, procedures, tools, tradecraft, and intentions. This Threat-Informed Defense model is not intended to replace frameworks such as the CSF but to document how to incorporate threat information into the relevant components of a full cybersecurity program. For that reason, a high score in this model indicates that threat knowledge is being optimally utilized to guide defensive investments and actions.

0 comments on commit 9741e92

Please sign in to comment.