IDG Contributor Network: 7 tips to turn threat data into true threat intelligence
Credit to Author: Robert C. Covington| Date: Thu, 16 Feb 2017 10:42:00 -0800
Threat intelligence has now been a favorite of the information security industry now for some time. It is a powerful concept — let someone else deal with an attack or exposure, and use their experience to prevent the same problem in your organization. Since there are free sources for a tremendous amount of such data, it seems like a great deal.
The great deal is not always as good as it seems, however. Threat intelligence information is quite often wrong or misleading. As I mentioned in “These are the threats that keep me awake at night,” a Vermont electric utility, responding to intelligence information in a U.S. government joint forces statement, called in the FBI to investigate what turned out to be an employee’s innocent attempt to read their email on Yahoo.
Unvetted threat intel is a bit like getting raw data feeds about the stock market. Responding to such data, you may be the next investment millionaire, or you could completely lose your shirt. You need to filter through it to eliminate the useless portions, and carefully weigh the balance.
As Malcovery Security said in a blog some months ago, most of what the industry refers to as threat intelligence is really just threat data. It is just a list of data elements, full of noise and false positives. Until the intelligence part is applied to this data feed, it is fairly useless, or even worse, may lead to false conclusions.
According to Mark Orlando in his presentation to the RSA Security Conference in 2015, raw threat intel data is highly commoditized, has poor quality control, a short shelf life, and promotes a false sense of awareness.
So, with so many negatives about threat intel, why does anyone bother?
The answer is simple — threat intel data properly filtered, vetted, and reviewed by a team with appropriate skills and experience can be of greater value than any other security tool in our arsenal. The operational security team at a large medical organization I work with has been able regularly to use a number of threat intel data points to identify active but unknown threats and vulnerabilities.
The following are some ideas to help turn threat data into true threat intelligence:
Much of the value from threat intel data results from its review by qualified and experienced professionals, who have learned by experience what to ignore, and what to focus on.
In the past few years, many information security threats have often been stratified by industry. While some threats are strictly random, many are targeted to a specific area of business. As an example, the medical industry has experienced a number of targeted ransomware threats in recent months. We can take advantage of this stratification by seeking sources of intelligence data specific to our industry This approach accomplishes much of the necessary filtering up front. Organizations exist for many industries that can provide some of this intelligence.
Unlike the early days in information security, where the casual hacker ruled, we now deal with sophisticated and adaptable professional criminals. Typically, as soon as they recognize that their campaigns have been discovered, they quickly pivot their attacks. As such, dated threat intel information is, if you will excuse the expression, so last week. To properly use threat data, stay focused on reviewing and acting on it shortly after receipt.
Coming off of a contentious elections season, we have all learned the term “fake news,” with certain news outlets seeming to have more reliable news items than others. The same distinction applies to threat intelligence. There are good sources and bad ones, and it is not always obvious which is which. It takes careful observation over a period of time to learn what sources you can rely on, and which you would be better off without.
Threat data is especially useful when you can apply it against recent activity data from your own organization. If someone in your industry reports that a bad actor is using a particular exploit, reviewing it against your organization’s recent activity can quickly help you discover that the same exploit is being used against you. This approach does require a centralized repository of log information from across your company. Log consolidation systems such as Splunk, include features that allow you to import threat intel data, and quickly review it against your recent activity.
Taking the above comparison to logs of your recent activities one step further, it is often possible to automate the receipt and processing of threat data, such that an alert is generated when a high value match has been found.
It is easy to get mired in a large amount of inbound data. Recognize its potential value, and stay with it. Constantly refine your processes so that you can use the data more effectively with fewer man hours.
The bottom line? Threat intelligence data can be your best friend, or can use up all of your free time to no avail. It is a great tool, but you must learn to use it effectively in a way that supports your environment.
This article is published as part of the IDG Contributor Network. Want to Join?