Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

Implementation Framework –

Cyber Threat Prioritization


Troy Townsend
Jay McAllister

September 2013

CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE Implementation Framework – Cyber Threat Prioritization 4.1
Copyright 2013 Carnegie Mellon University

This material is based upon work funded and supported by ODNI under Contract
No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the
Software Engineering Institute, a federally funded research and development center
sponsored by the United States Department of Defense.

Any opinions, findings and conclusions or recommendations expressed in this


material are those of the author(s) and do not necessarily reflect the views of ODNI
or the United States Department of Defense.

NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE


ENGINEERING INSTITUTE MATERIAL IS FURNISHEDON AN “AS-IS” BASIS.
CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER
EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED
TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY,
OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON
UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO
FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT.

This material has been approved for public release and unlimited distribution except
as restricted below.

Internal use:* Permission to reproduce this material and to prepare derivative


works from this material for internal use is granted, provided the copyright and “No
Warranty” statements are included with all reproductions and derivative works.

External use:* This material may be reproduced in its entirety, without modification,
and freely distributed in written or electronic form without requesting formal
permission. Permission is required for any other external and/or commercial use.
Requests for permission should be directed to the Software Engineering Institute at
permission@sei.cmu.edu.

* These restrictions do not apply to U.S. government entities.

DM-0000620

4.2 Implementation Framework – Cyber Threat Prioritization CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE
Implementation Framework –
Cyber Threat Prioritization

Background

The Software Engineering Institute (SEI) Emerging Technology Center at legitimate threats to the organization. Instead of prioritizing a cyber threat
Carnegie Mellon University studied the state of cyber intelligence across solely on the capability and intent of threats actors, the framework enables
government, industry, and academia to advance the analytical capabilities analysts to see the utility of also understanding the threat’s relevance to
of organizations by using best practices to implement solutions for shared their organization, strengthening their threat prioritization as they come to
challenges. The study, known as the Cyber Intelligence Tradecraft Project realize that a somewhat capable actor with a desire to deface websites
(CITP), defined cyber intelligence as the acquisition and analysis of should not be considered in the same category as a highly capable actor
information to identify, track, and predict cyber capabilities, intentions, and intent on extracting confidential, strategic documents for extortion or
activities to offer courses of action that enhance decision making. blackmail.

A significant challenge that emerged from the CITP was the way in which
analysts prioritize cyber threats. The SEI team observed a diverse array of
approaches, from analysts relying on the media and third-party intelligence
service providers to using data-centric models based on a narrow scope
of factors.

When threat prioritization models are too narrow, they prevent analysts
from effectively monitoring the changes and evolution of the most relevant
and severe cyber threats. This hinders cyber intelligence and security
professionals from proactively implementing defenses to guard against
the latest attack trends and techniques. Among the CITP’s government
participants, most intelligence analysts prioritized cyber threats by the
likelihood of an actor executing an attack, which they quantified through
the summation of an actor’s sophistication (capability) measured against
their desire to target the organization (intent). The SEI team noted that as
these analysts transitioned to the private sector, so too did this approach.
Conversely, private sector CITP participants without experienced
government intelligence analysts tended to discount the utility of knowing
the threat actor and prioritized cyber threats by the impact attack methods
had on the organization or the risk attack methods posed because of the
organization’s known vulnerabilities.

This Cyber Threat Prioritization Implementation Framework leverages the


best practices of CITP participants and SEI expertise to offer a holistic
approach to prioritizing cyber threats using a customized, tiered threat
prioritization framework. The framework breaks down cyber threats into
three core components: the likelihood of threat actors executing attacks,
the impact threats have on an organization’s business, and the risk threats
pose because of an organization’s known vulnerabilities. By assessing
threats according to these components, analysts come to fully understand
the causes and effects of relevant threats, which significantly improves
the efficiency of their organization’s cyber intelligence efforts because
they have the necessary context to accurately align analytical and
security resources to the current and future cyber attacks posing the most

CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE Implementation Framework – Cyber Threat Prioritization 4.3
Examples  of  how  assessing  threats  according  to  this  
elements  and  factors  augments  an  analyst’s  cyber  in
Factor Factor Factor Factor
                                           Description,  
Description,                                                                      Description,  
                                            Description,  
Examples    • Identify   Examples   cyber     threats  Examples   using  the     three   Examples    
core  components   of  a  threat.    
Implementation
Examples:  
Indicators  of  Success
Here’s how analysts can leverage the Cyber Threat Prioritization 4. A Likelihood:  
 ssess the likelihood, impact,Threat  
and risk actors  
of the-­‐  cyber
State-­‐sponsored,  
threats. Use thecompetitors,  c
Implementation Framework to augment their organization’s cyber factors
Examples  of  how  assessing   andasub-elements
 threats   Impact:  
ccording   to  tA in
ttack  
his   each athreat
types  
element   scomponent’s
-­‐  D
nd  its   DoS,  stealing  
ub-­‐ spider graph
intellectual   property  (
intelligence efforts: elements  and  factors  ato rate the
ugments   an  corresponding elements cas
analyst’s  cyber  intelligence   a low, medium, or high priority
apabilities.  
Risk:  Known  vulnerabilities  -­‐  High-­‐profile  employees,  unpat
                                                                                                                                                            attribute of the threat. The average of these ratings   then determines
1. Adopt these definitions:   the likelihood, impact,
• Identify  cyber  threats  using  the  three  core  components   of  a  threat.     and risk of the threat, which combine to indicate
Threat = Likelihood + Impact + Risk Assess   the  litikelihood,  
whether should be considered impact,  aand   low,risk  
medium,of  the  orcyber   threats.  
high priority Use  the  factor
threat.
Likelihood Examples:   = Capability + Intent spider  graph  to  rate  the  corresponding  elements  as  a  low,  medium,  or  hig
Impact = Operations Likelihood:   + Strategic Threat   Interests actors  -­‐  State-­‐sponsored,  
Example: Acnompetitors,  organization wants criminals,  
to know hactivists,  
how it should recreational  
prioritize hackers  
these  ratings  then  determines  the  likelihood,  impact,  and  risk  of  the  threa
Risk = People   + Cyber Footprint
Impact:  Attack  types  -­‐  DDoS,  stealing  intellectual  property  (IP),  damaging/incapacitating   its analytical and network defense efforts for a possible network  assets      
considered   a  low,  medium,  
recreational hacker DDoS or  high   attack priority  
on thethreat.    
organization’s secure
Risk:  Known  vulnerabilities  -­‐  High-­‐profile  employees,  unpatched  devices,  unsecured  remote   access  
Example:  
payment   site. Analysis indicates the likelihood of the recreational
2. Become   familiar with the provided spider graphs to gauge the factors hacker executing
An   organization   the attack wants   is high to  due
know  to his attack
how   methods
it  should   prioritize  its  a
that comprise each Assess   of thetthree he  likelihood,   threat components. impact,  and  risk  of  the  cyber  threats.  and Use   the  factors  
resources. However, and  sthe ub-­‐elements  
impact of thein   DDoSeach   threat  
attack is component’s  
recreational  hacker  DDoS  attack  on  the  organization’s  secu
Spider graph spider   key: graph   Titletof o  threat rate  tcomponent he  corresponding  elements  as  a  low,  assessed medium,  asor   low high  
because priority   the asecure ttribute   of  the  
payment site threat.  
has minimal The  average  of
Description and example from the  recreational  hacker  executing  the  attack  is  high  due  to  
these  ratings  then  determines  the  likelihood,  impact,  and  risk  of  the  threat,  which  combine  to  indicate  whether  it  should  b impact on the organization’s operations and strategic interests
a CITP participant due toimpact  
it still being of  the   DDoS  abeta
in internal ttack   is  assessed  
testing. This alsoameans s  low  the
because  the  s
considered  a  low,  medium,  or  high  priority  threat.    
Threat Component (likelihood, impact, or risk) organization’s  
risk associated with theoattack perations   is lowabecause nd  strategic  
of the isecurenterests  due  to  it  s
Example:     payment site’s limited interaction with people and cyber
Description the  risk  associated  with  the  attack  is  low  because  of  the  sec
An  organization  wants  to  know  how  it  should   prioritize  
footprint. its  analytical   and   network  
initiallydappeared
efense  efforts   a for  a  poss
and  Therefore,
cyber  footprint.   this threat, which
Therefore,   this  threat,  towbe hich   initially  a
recreational  hacker  DDoS  attack  on  the  organization’s   high priority, snow ecure  canpbe ayment  
classified site.  
as aAmediumnalysis  to indicates  
low threatthe  likelihood
requiring
as   a   m edium   t o   l ow   t hreat   r equiring   m inimal   a nalytical   and
Element of the the  Element recreational   of the hacker  executing  the  attack   is  high  minimal
due  to  analyticalhis  attack   and mnetworkethods  defense attention. However,  the
and  resources.  
Threat Component Threat Component   Note: Always factor timing into the threat prioritization assessment. When
Description impact   Description of  the  DDoS  attack  is  assessed  as  low  because  the  secure  payment  site  has  minimal  impact  on  the  
Note:  
a threat Always  
actor or factor  
organization timing  does into  something
the  threat   canprioritization  
be just as important assessment.  
as When
organization’s  operations  and  strategic   why interests  
or how. A due  actor
threat to  it  may
still  have
being   no in  
desireinternal  
to beta  
target an torganization,
esting.  This  also  mean
be  just  as  important  as  why  or  how.  A  threat  actor  may  have  no  desire  to  t
the  risk  associated  with  the  attack  ibut s  low  
since because  
it is a national of  the  holiday, secure   thepayment  
organization site’s   limited  
becomes interaction  
a target of with  peop
holiday,  the  organization  becomes  a  target  of  opportunity  for  the  actor  to
Sub-element Sub-element Sub-element Sub-element
and  cyber  footprint.  Therefore,  this  threat,  which  initially  appeared  to  be  a  high  priority,  now  can  be  classif opportunity for the actor to test a new tool simply because none of its
Description Description Description Description security  
network esecurity
mployees   employees are  at  are work.  
at work.  
as  a  medium  to  low  threat  requiring   minimal   analytical   and  network   defense  attention.    
 
Factor   Factor Factor Factor
5. Plot
Plot   all  all threatsfor  
threats   for eeach
ach  component on o
component   graphs similar
n  graphs   to the following:
similar   to  the  following:    
Example Example Example Example•
Note:  Always  factor  timing  into  the  threat  prioritization  assessment.  When  a  threat  actor  or  organization  does  something  
Factor Factor
be  just   why  or  how.  A  tFactor
as  important  as  Factor hreat  actor  may  have  no  dLikelihood  
esire  to    t    arget  
          an  organization,  bImpact  
ut  since  
               i  t  
     i  s  
       a          n
     ational  
   
Example Example Example Example (to  organization) (
holiday,  the  organization  becomes  a  target  of  opportunity  for  t(by   he  tahreat  
ctor  atctor)
o  test  a  new  tool  simply  because  none  of  its  netwo
Medium High Medium High
security  employees  are  at  work.    
Indicators of Success Strategic  
Capability People
Examples of how assessing   Interests
Low Medium Low Medium
threats according to this element
• Plot  all  threats  for  each  component  on  graphs  similar  to  the  following:    
and its sub-elements and factors Intent Operations
augments an analyst’s
Likelihood                   Impact                                                       Risk                                                                                  
cyber intelligence capabilities. •(to  oUse   all  three  graphs  to  holistically   (by  known  ve valuate  the  overall  cyber  threat  enviro
ulnerabilities)
(by  threat  actor) rganization)
Medium High
resources  
Medium High to  the  current  and  fMedium
uture  cyber  
High attacks  that  pose  the  most  legit
3. Identify cyber threats using the three core components of a threat.
Example:     People Strategic  
Capability
Interests
Examples: Likelihood: Threat
Lowactors -Medium
State-sponsored, If  cyber  intelligence  
Low analysts  
Medium rate  all  components  of  a  threa Low Medium
competitors, criminals, hactivists, recreational organization’s  nCyber   etwork   servers  for  industrial  espionage  pur
Intent Operations Footprint
hackers   then  the  organization  s
place  (risk)  as  a  high  priority  threat,  
• Use  all  three  graphs  to  holistically  evaluate  the  overall   Use allcyber  
three tgraphshreat  toenvironment  
holistically evaluate to  efficiently  
the overallalign  
cyberanalytical  
threat and  security
Impact: Attack types - distributed denial-of-service environment to threat  
efficiently over  
align others  
analytical where  
and the  likelihood  
security resources is  toequally  
the as  high,  b
resources  to  the  current  and  future  cyber  attacks  that  pose  the  most  legitimate  threats  to  the  organization.        
(DDoS), stealing intellectual property (IP), damaging/     current and future cyber attacks that pose the most legitimate threats to
Example:  
incapacitating network   assets
Overall  Indicators  
the organization. of  Success  

If  cyber  intelligence  analysts     rate  all  components  of  a  threat  actor  executing  a  worm  (likelihood)  against  an
Risk: Known vulnerabilities - High-profile employees,
organization’s  network  servers   or  iExample:
• fThreat   ndustrial   Ifecyber intelligence
spionage  
prioritization   analysts
purposes  
influences   rate
(impact)  
which   all tcomponents as  no  ofw
hat  thhreats  
potential   gaet  
threat
orm   mitigation  
addressed   by  isn  ec
unpatched devices, unsecured remote access actor executing a worm (likelihood) against an organization’s
resources  
place  (risk)  as  a  high  priority  threat,   then  tahe  
re  oarganization  
llocated.   should  immediately  position  itself  to  focus  on  thi
network servers for industrial espionage purposes (impact) that
threat  over  others  where  the  likelihood  is  equally  as  high,  but  impact  and  risk  is  lower.  
has no worm mitigation in place (risk) as a high priority threat,
    then the organization should immediately position itself to focus
Overall  Indicators  of  Success   on this threat over others where the likelihood is equally as high,
  but impact and risk are lower.
• Threat  prioritization  influences  which  potential  threats   get  addressed  by  security  operations  and  how  network  security  
4.4 Implementation resources   are  Threat
Framework – Cyber Prioritization
allocated.   CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE
Overall Indicators of Success
• Threat prioritization influences which potential threats get addressed by
security operations and how network security resources are allocated.

• Collection management is streamlined and organizations are able


to better communicate their requirements to third party intelligence
vendors.

• Cyber threats are widely communicated to the organization and


employees are aware of the most relevant threats.

• Cyber threats are proactively monitored and prioritized, with updates


available to inform security operations, intelligence analysts, and
decision makers.

• Analytical production aligns with threat prioritization. For instance,


the organization develops a tiered system to communicate threat
information to stakeholders:

- Tier 1: Potential threat averages a high rating. Analysis required


within 90 minutes.

- Tier 2: Potential threat averages a medium rating. Analysis


required within 8 hours.

- Tier 3: Potential threat averages a low rating. Analysis required


between 3 and 5 days.

- Tier 4: Potential threat does not compute a rating, but is an


indirect threat for anyone using the Internet. No specific
timeframe for analysis.

• Analysts use threat prioritization to do predictive analysis, like


developing scenarios to test how defenses will react to the full spectrum
of cyber threats.

CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE Implementation Framework – Cyber Threat Prioritization 4.5
Likelihood
Understanding the capabilities and intentions of cyber threat actors determines the likelihood of them targeting an organization. To determine this
likelihood, a CITP participant from industry monitored open source publications from an organization known to sponsor cyber threat actors who frequently
targeted the organization. Analyzing this accessible data provided insight into the motivations of the sponsored cyber threat actors, allowing the CITP
participant to narrow down the types of data likely to be targeted, and work with network security experts to create diversions, honey pots, and employ
other measures to proactively defend against the threat.

Likelihood

Capability Intent
An actor’s sophistication, tools, and resources to execute The actor’s purpose and the expected outcome of the cyber
a cyber attack determine their capability. Assessing attack determine the intent. Prioritizing actors by their intent
capability as an independent variable of likelihood means allows analysts to focus on the most relevant threats.
organizations can avoid the pitfalls of devoting time and
attention to “paper tiger” threats.

Attack Methods Resources Motive Targeted Data


Humans are creatures of habit. Although Understanding what is available to threat Why do threat actors attack? Determining Understanding what a threat actor is after
threat actors take great care to avoid actors offers context to the sophistication an actor’s motive provides insight into the will factor into determining their intent to
detection, at some level they too succumb of their attacks. Leverage government, possible direction of their behavior, and target the organization.
to this adage. Tracking how threat actors industry, and intelligence service provider determines their interest in targeting the
operate exposes patterns that analysts can information sharing arrangements to learn organization.
use to combat their effectiveness. about actors resources. Personally Identifiable
Information (PII)
Intrinsic (personally Are the attackers stealing personal
Infrastructure Money rewarding) information from your customers?
Sophisticated threats often require Obtaining and maintaining Fame, bragging rights, thirst for From your employees?
an infrastructure to operate. This capabilities incur costs. Well- knowledge/access, justification of Determining if this type of
can be assessed by looking for hop resourced/sponsored threat actors skills, satisfying boredom, information is vulnerable can help
points used during an attack, the are often more dangerous than less patriotism, and hactivist allegiance; assess the likelihood that the actor
command and control network, or resourced actors, with other variables all reasons a hacker might be targets the organization.
the size and scope of a botnet. being equal. motivated to target an organization.
Research and Development
Technology People Extrinsic (receive external Some actors exist to steal corporate
Technology used or manipulated for From collaborators and co-workers R&D data. Organizations with heavy
reward or avoid punishment)
an attack can indicate the capability to teachers and mentors, the number R&D missions are more likely to be
Extrinsic motives revolve around two
of a threat actor. More sophisticated and type of people involved in a targeted by actors specializing in
key concepts: reward or avoiding
actors target SCADA or ICS devices, campaign can be indicative of its corporate espionage or supporting
punishment. These motives include
web-enabled products, or mobile capability. nation-states.
everything from state-sponsored
devices in addition to traditional
Tools denial and deception operations,
servers and clients. Business Process
Tools often hint at the capability of misinformation campaigns, and
psychological operations to financial Certain categories of actors,
Coding an actor, but the lack of a custom especially insider threats, target the
tool does not always imply a novice incentives from competing
Nuances and personal preferences in inner workings of the organization.
attacker. Most sophisticated actors businesses, organized crime, and
coding not only assist with From hiring and firing information to
will use the right tool for the job; if blackmail.
attribution, but also can indicate actor time cards and audit findings,
sophistication. open source tools will work, there is organizations likely will be targeted
no need to customize one. if this information is accessible.
Maturity
Training Industrial Control Systems
The maturity of the actor takes into
The type and quality of training
account their planning process, Certain actors specialize in
available to the threat actor can help
pre-attack activities (research/ compromising industrial control
determine their capability. Online
recon/social engineering), and post systems and the associated
videos, IRC channels, certification
attack actions (such as tool updates human-machine interface.
courses, military training, or formal
or incorporating lessons learned). Organizations operating these
academic education all yield
systems should prioritize these
Targets different levels of sophistication.
threat actors accordingly.
Capability can be assessed by
looking at what is targeted.
Does the actor rely on mass phishing
emails, identify specific targets
(network, website, employee,
mobile platform) or exploit a specific
vulnerability (Adobe, Windows,
SQL, etc.)?

Indicators of Success
• Analysts have a repository of current and historical threat actor tactics, • Analysts understand threat actors’ intentions well enough to assign them to
techniques, and procedures (TTPs) to generate profiles that are fed into data different categories, such as nation-state, criminal, hactivist, recreational, or
collection platforms to separate known threats that automated defensive competitor; enabling them to identify the most likely threats their organization
actions can mitigate from unknown threats requiring an analyst’s attention. faces through profiling.
• Analysts gain perspective on the tools threat actors use to assess how • Analysts realize that if a threat actor is targeting their organization for
they access an organization or if they outsource tool development. A basic fame, the likelihood increases for the actor to choose a DDoS attack to the
netflow analysis could show the majority of attacks come from well known, organization’s website as the attack method.
prepackaged scripts, which analysts can easily combat using remediation
• From their organization being the first result in a Google search to knowing
efforts posted on open source websites.
over what holidays certain actors like to conduct attacks, analysts recognize
• Analysts realize that sophisticated actors use the lowest common denominator the importance of timing when it comes to assessing the overall likelihood of
for attacks. If a threat actor can use an off-the-shelf tool to accomplish their a threat.
goal, they’ll wait to deploy customized tools on harder targets.
• Analysts understand that the targeting of Adobe or Windows software
vulnerabilities usually equates to a threat of lower sophistication than one
targeting Windows operating systems.

4.6 Implementation Framework – Cyber Threat Prioritization CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE
Impact
Analyzing the effects cyber attacks have on an organization’s operations and strategic interests provides quantifiable, business-related information to
justify its impact on the organization. A CITP participant quantified the impact of cyber threats to their leadership by assessing how much money the
organization would pay to reroute its product distribution channels after a hacker compromised the network and disclosed specific travel routes to
competitors intent on disrupting this distribution.

Impact

Operations Strategic Interests


Cyber attacks adversely affect an organization’s day-to-day Some impacts are harder to quantify, but they are no less
operations. Since the effects often are financially quantifi- important. Strategic interests capture the intangible aspects
able, analysts can use dollar amounts to communicate the of the organization that can be affected by a cyber threat.
impact attacks have on how an organization functions.

Direct Costs Business Operations Organizational Interests External Interests


Cyber attacks have a financial In addition to the known costs of Plans, people, and products offer Organizations do not operate in a bubble,
impact on organizations. Prioritizing responding to an attack, organizations tremendous insight into why an and neither should threat prioritization.
threats according to their cost in also should consider the cascading organization is targeted and where a Consider the ramifications cyber attacks
terms of remediation and mitigation can effects an attack can cause and their threat can do the most damage if certain can have on organizational partnerships,
resonate with technical and associated costs. information is compromised. reputation, culture, geopolitics, and
non-technical stakeholders. market space.

Incident Response Supply Chain Strategic Planning Market/Industry


Consider the costs to perform an Costs associated with the inability Consider the impact of losing How are competitors affected by the
investigation, remediation, and to meet demand, delay to strategic vision data, such as annual cyber threat? Is the industry equally
forensics; including required software/ operations, and having to reports, 1/3/5 year strategic affected by the threat? Consider
licenses for incident response tools. supplement/replace suppliers can outlooks, operational policies, national and foreign competition in
significantly impact an organization. mergers, and acquisitions. threat prioritization.
Downtime
Business costs of a network-reliant Logistics Stakeholders Geopolitical
service being unavailable, including An organization must function Assess how threats impact Does the threat affect political
missed transactions or loss of whether it is enduring an attack or shareholders, board of directors, relationships, or the ability to
potential revenue also play a role not, so make sure to consider the and employees. operate in foreign countries? Will
cost of continuing operations during the impact of the threat affect the
and after an attack, such as stock market? Is the local/regional
Mitigation and/or Prevention Organizational Culture
re-routing communications, securing economy impacted? All of these
Factor in costs of additional Factor in the impact of
intellectual property, adding factors play a role that decision
hardware/software required to legal/regulatory requirements from
equipment/personnel to avoid makers will want information on.
mitigate a specific threat. governments, law enforcement,
another similar attack, and upgrading regional entities (European Union), Partnerships
systems/networks/processes. and external business arrangements. Consider the impact to third parties,
Also consider changes to the including information-sharing
Future Earnings organization's culture, including partners (government/industry/
Loss of intellectual property may work-from-home policies, complex service provider) and other business
reveal R&D investments or R&D password requirements, and relations (companies/governments/
strategies, delay product releases, restricted network access. regions). Assess the validity
affect future acquisitions, and cause of shared data if strategic partners
a loss of competitive advantage. are affected.

Brand Reputation
Brand Reputation: Understand
the impact to the brand and its
implications on public opinion.

Indicators of Success
• Internally, analysts establish frequent communication with the business • Analysts ensure that threat prioritization isn’t based off personal biases or
units responsible for operations to discuss threats, alter threat prioritization, those of decision makers, stakeholders, service providers, or the media.
and predict new threats. These business units can include R&D, physical
• Analysts correlate logs of IPs accessing the parts of their organization’s
security, risk management, IT, human resources, insider threat, and business
website containing data on strategic planning and intellectual property with
intelligence.
known bad IPs to predict where threats will be concentrated now and in the
• Analysts identify and remediate the cascading effects a cyber attack could future.
have by targeting one part of the organization’s operational network and
• Analysts understand the financial cost associated with a geopolitical event in
systems.
a country threatening their organization’s Internet presence in that market.
• Analysts recognize how a cyber attack could impact the organization’s
• Analysts recognize that if peers in their industry and the organization’s
ability to operate and communicate to stakeholders and institute appropriate
economic interests are being attacked, the likelihood of being targeted
contingencies to eliminate this impact when an attack occurs in the future.
increases and they take preventative measures to ensure that doesn’t happen.
• Knowledge of the impact cyber attacks can have on an organization’s
operations enables analysts to determine the financial costs to recover and
repair damage done by the threats that the analysts’ prioritization efforts deem
most likely to harm the organization.

CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE Implementation Framework – Cyber Threat Prioritization 4.7
Risk
Assessing how people and the organization’s cyber footprint make the organization vulnerable to cyber attacks determines what areas within it are
the most at risk of being targeted. One CITP participant’s CEO is active with companies and institutes that are separate from the organization. The CITP
participant’s cyber intelligence analysts maintain an awareness of these activities, so when hacktivists publicly threatened attacks against one of the
institutes, the analysts knew this could have implications for their organization and altered network defenses to prepare for a potential attack.

Risk

People Cyber Footprint


Cyber threats generally have one thing in common; at some The greater an organization’s online exposure, the more
point a human interacts with the threat. This interaction must opportunity an attacker has to find vulnerabilities. Consider
be a part of threat prioritization to understand an attacker’s the organization’s infrastructure, supply chain, online
most commonly targeted vulnerability: people. exposure, and components most susceptible to attacks.

Relevance Access Infrastructure Online Presence


From leadership to rank-and-file employees, Employees with administrator privileges or The unknown provenance of software and The content and services an organization
the Internet offers a communication access to sensitive data are more attractive hardware complicates risk determination in provides on the Internet serve as attractive
platform that allows anyone to make their targets for threat actors. Determining who the cyber environment. Overcoming this targets for threat actors. Analysts can
organization more visible to threat actors. has what access can significantly aid in limitation requires researching where, when, assess severity of risk based on this insight
identifying the risk to employees. and how an organization’s infra-structure is into likely attack vectors.
most susceptible to cyber threats.

Online Presence Physical and Network-Based Hardware Website


Maintain awareness of information Access Develop a blueprint of where Analyze how threat actors might
employees put online and their Individuals have varying access network appliances, workstations, leverage an organization’s website
popularity on blogs/social media— to both physical and network-based and third party equipment connect to to plan and execute an attack.
both can garner the attention of sections of an organization that threat the organization’s network and This includes compromising
threat actors. Information posted actors can leverage to execute an identify the most likely risks for customer account log-ins, collecting
online can unwittingly reveal attack. Assess which employees are at cyber threat activities. employee contact information,
vulnerabilities and flaws in security higher risk of being targeted based on defacing the site, or denying
policy, or incite threat actors to their access. Software legitimate access to it.
target the organization. Most organizations rely on software
Position to accomplish day-to-day operations. Additional Exposure
Extracurricular Activities As with access points, consider A robust threat prioritization assesses An organization’s public relations
Be mindful of the activities how threat actors can exploit the the risks associated with relying on and marketing departments track
employees participate in outside of different roles people play particular software, which network how social media and other aspects
work. Employees’ status with throughout the organization, users require access to high-risk of the Internet help bring attention
external institutions, such as from network administrator or HR software, and the organization’s to the organization. Threat
non-profits, may increase their risk representative to CEO, supply ability to detect if a software prioritization efforts also should
of being targeted. chain manager, or a recently vulnerability has been exploited. track how this attention affects its
fired employee. cyber threat environment.
Motive Supply Chain
There always is a rhyme or reason Abnormal Activity The most stringent network
Additional Services
for why people enable cyber attacks. Develop baseline or expected FTP, Telnet, VPN access, webmail,
defenses can be subverted by
Whether it’s ignorance, financial network behavior for key users. remote desktop, and other
counterfeit equipment or software.
trouble, disgruntlement, or boredom, Consider what deviations may web-based services used by an
Understanding and assessing
by knowing these vulnerabilities indicate potential nefarious activity organization increase the risk of
threats to the organization’s supply
analysts can diminish their and consistently watch for them. potential cyber attacks, and should
chain provides additional data points
effectiveness through prevention. Some examples can involve an be factored into threat prioritization.
to measure risk of compromise
employee working off-hours, through the organization’s
emailing attachments to personal network infrastructure.
email accounts, or accessing
information that is unrelated to their
normal job.

Indicators of Success
• Whether it is an employee alerting about a suspicious email they received • Analysts understand the organization’s operating environment well enough
or a vendor providing a list of bad IPs, analysts have engaged enough with that with system updates and patches, they alleviate ~80% of threats; freeing
individuals associated with the organization that they actively contact the them to focus on the ~20% that could significantly impact the organization.
analysts about issues that could alter how threats are prioritized.
• Analysts recognize their organization is only as secure as its supply chain. If
• Employee feedback influences threat prioritization because analysts offer it acquires software and analysts don’t know who did the actual coding, the
feedback mechanisms via all of their cyber intelligence communication code’s reliability, or to what extent it has been error tested, then they won’t
platforms; emails, analytical products, briefings, or awareness campaigns. know how threat actors could use potential vulnerabilities within the code to
conduct an attack.
• If the CEO or a junior analyst blogs about topics that likely will bring the
attention of threat actors, analysts are aware of these activities and consider • Analysts incorporate timing into their prioritization efforts to align increases
the position, influence, popularity, and online presence of these individuals in in network defenses with the different times during the year (holidays, system
order to predict how they should change the organization’s security posture. upgrades) when the organization’s network is most vulnerable.
• Analysts become aware of the fact that every vulnerability is not a threat
worthy of further analysis and mitigation.

4.8 Implementation Framework – Cyber Threat Prioritization CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE

You might also like