daniel mccauley - retr3at

39
What is Threat Intelligence and How Best to Leverage It

Upload: retr3at

Post on 24-Jul-2016

224 views

Category:

Documents


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Daniel McCauley - RETR3AT

What is Threat Intelligenceand How Best to Leverage It

Page 2: Daniel McCauley - RETR3AT

Daniel McCauley

´ Sr. Cyber Security & Threat Intelligence Analyst

´ Annual Cyber Exercise and Security Awareness Initiatives

´ Western North Carolina

´ BSides Asheville, WNC InfoSec

Page 3: Daniel McCauley - RETR3AT

Definition

“Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject's response to that menace or hazard.” -Gartner

Page 4: Daniel McCauley - RETR3AT

Another Description

A process or methodolgy which effectively reduces risks associated with threats by identifying and raising awareness to relevant events. Also includes facilitating remediation efforts to reduce overall impact.

Page 5: Daniel McCauley - RETR3AT

Not Just…

´ Attack Maps

´ Threat Feeds

´ Intelligence Portals

´ Blinky Lights

Page 6: Daniel McCauley - RETR3AT

TI Objectives

´ Monitoring

´ Assessment

´ Communication

Actionable Intelligence!

Page 7: Daniel McCauley - RETR3AT

Monitoring

´ Potential Direct Risk to Your Organization

´ Media Attention

´ Direct Inquiries

´ Neighborhood

´ Internal/External Sources

´ New and/or Previous Techniques or Campaigns

Page 8: Daniel McCauley - RETR3AT

Monitoring - Internal Sources

´ Non-Security Events

´ Security Control Events

´ Customer Reported

Page 9: Daniel McCauley - RETR3AT

Monitoring - External Sources

´ Commercial/Paid

´ Private – member organizations (ISAC’s), mailing lists, etc.

´ Government

´ OSINT´ Social Media

´ Blogs, Forums, Wikis

´ Text Sharing

´ IRC

´ Dark Web

Page 10: Daniel McCauley - RETR3AT

Assessment

´ Risk Factors and Levels

´ Keep it Simple

´ Potential vs Current Risk

Page 11: Daniel McCauley - RETR3AT

Assessment - Potential Risk

Considerations:

Attack Vectors

Impact

Scope

Page 12: Daniel McCauley - RETR3AT

Assessment - Current Risk

Considerations:

Effectiveness of Mitigating Controls

Maturity/Life Cycle of Threat

Page 13: Daniel McCauley - RETR3AT

Communication

´ Traffic Light Protocol

´ Standardized Templates´ Summary

´ Assessment

´ Actions

´ Reference

´ SLA

´ Know Your Audience!

Page 14: Daniel McCauley - RETR3AT

Communication - Best Practices

´ Keep Media Hype in Perspective

´ Become a Single Source of Authority

´ Tailor Message to Your Audience´ Define notifications based on recipient groups (people, events, etc.)

Page 15: Daniel McCauley - RETR3AT

Important to Know

´ Assets

´ Defense in Depth Capabilities and Limitations

´ Available Resources

Page 16: Daniel McCauley - RETR3AT

The Process

U.S. Department of Defense’s Joint Publication 2-0: Joint Intelligence

Page 17: Daniel McCauley - RETR3AT

Information vs Intelligence

iSight Partners – What is Cyber Intelligence and why do I need it?

Page 18: Daniel McCauley - RETR3AT

Lifecycle

Page 19: Daniel McCauley - RETR3AT

Types

´ Tactical

´ Strategic

´ Technical

´ Operational

Page 20: Daniel McCauley - RETR3AT

Tactical

´ Long Term

´ Attacker TTPs

´ Audience – Network Architects and Administrators

Page 21: Daniel McCauley - RETR3AT

Strategic

´ Long Term

´ High-Level Information on Threat Landscape

´ Audience – Board, Senior Executives, Management

Page 22: Daniel McCauley - RETR3AT

Technical

´ Immediate Use

´ IOC’s Related to Specific Malware

´ Audience – Security Operations Center and Incident Response

Page 23: Daniel McCauley - RETR3AT

Operational

´ Immediate Use

´ Details of Specific Attacks and Campaigns

´ Audience – Defensive Teams

Page 24: Daniel McCauley - RETR3AT

Confidence

´ High Quality Intelligence à Higher Confidence Risk Assessment

´ High Confidence Assessments à Improved Response to Threats

Page 25: Daniel McCauley - RETR3AT

Sharing

´ Greatly Beneficial to Those Involved

´ Widespread Adoption is Lacking

´ Difficult to Quickly and Efficiently Distribute Large Amounts of Indicators

Page 26: Daniel McCauley - RETR3AT

Sharing – Cyber Threat Alliance

Page 27: Daniel McCauley - RETR3AT

Sharing – Cyber Threat Alliance

Page 28: Daniel McCauley - RETR3AT

The Analyst

´ Analytical and Creative Problem-Solver

´ Aware of Biases

´ Diverse Background´ Network Engineering, Malware Analysis, Security Architecture, Systems

Administration, Social Engineering, etc.

´ Strong Communication Skills

´ Coding/Programming

Page 29: Daniel McCauley - RETR3AT

Some Problems…

´ Abundance of sources (OSINT, paid/subscription, private)

´ Not all “threats” are relevant

´ Various formats of data

´ Storage and Maintenance

Page 30: Daniel McCauley - RETR3AT

Managing the Data/Information

´ Organizations are eager to ingest more and more´ Internal, External, or Both

´ Elasticsearch, Hadoop, etc.

´ Data Format Agnostic

´ Fusion Centers´ Dedicated Teams

´ Analyzing Events 24/7

Page 31: Daniel McCauley - RETR3AT

Data/Information Goals

´ Provide Context to Threats

´ Enrich Events

´ Correlate

´ Visualize/Present

´ Parse and Efficiently Index´ Through custom efforts within a specific context

Page 32: Daniel McCauley - RETR3AT

Innovation Engineer

´ Strong Unix /Linux background

´ Big Data architecture and engineering experience

´ Threat Intelligence background

´ Data Correlation background

´ Data Visualization background

´ Development experience in multiple programming languages.

Page 33: Daniel McCauley - RETR3AT

Tools

´ ELK Container – https://hub.docker.com/r/sebp/elk/

´ Combine – https://github.com/sooshie/combine

´ OSCAR-F - https://github.com/V12-Operations/OSCARf-public

Page 34: Daniel McCauley - RETR3AT

ELK Container

Page 35: Daniel McCauley - RETR3AT

Combine

Page 36: Daniel McCauley - RETR3AT

Combine - Plugins

Page 37: Daniel McCauley - RETR3AT

OSCAR-F

Page 38: Daniel McCauley - RETR3AT

Resources/References

´ http://www.robertmlee.org/

´ http://digital-forensics.sans.org/blog/2015/07/09/your-threat-feed-is-not-threat-intelligence

´ http://countuponsecurity.com/

´ https://www.cpni.gov.uk/Documents/Publications/2015/23-March-2015-MWR_Threat_Intelligence_whitepaper-2015.pdf

´ http://researchcenter.paloaltonetworks.com/2015/10/cryptowall-3-the-cyber-threat-alliance-and-the-future-of-information-sharing/

Page 39: Daniel McCauley - RETR3AT

Thank You!

[email protected]

@vintsurf