“The Security Intelligence Handbook” Notes

Chad Warner
4 min readNov 30, 2021

The Security Intelligence Handbook: How to Disrupt Adversaries and Reduce Risk With Security Intelligence, Third Edition by Recorded Future is an excellent, comprehensive overview of cyber threat intelligence (CTI) from a leader in that space. It’s accessible, able to be understood by technical and non-technical readers.

You can download the ebook for free (some personal info required).

My notes follow.

“The Security Intelligence Handbook”

Foreword

Principles of effective security intelligence

  1. Focus on disrupting the adversaries most likely to target you, and make their lives as challenging as possible using security intel.
  2. Security intel must provide timely, clear, actionable context required to make fast, informed decisions and take effective action. Intel must get everyone in organization on same page.
  3. People and machines work better together. Machines are better at processing and categorizing raw data. Humans are better at intuitive, big-picture analysis.
  4. Security intel isn’t a separate domain of security; it’s the context required by every security role.

Introduction

Term “threat intelligence” is usually associated with info about threats to traditional IT systems. Term “security intelligence” is broader, including third-party risk, brand protection, geopolitical risk, etc. in addition to threat intel.

What Is Security Intelligence?

Data, information, intelligence

  • “Data” is discrete facts and stats gathered for analysis (e.g., IP addresses, URLs, hashes).
  • “Information” is multiple data points combined to answer specific questions (e.g., answer to question, “How many times has my organization been mentioned on social media this month?”).
  • “Intelligence” is result of analyzing data and info to uncover patterns and provide context for decision-making. It must point toward specific decisions or actions, and be tailored for easy use by a specific person, group, system that will use it to decide or act.

Characteristics of successful security intel processes

  1. Collaborative process and framework (sharing across departments)
  2. 360-degree visibility (scanning wide variety and quantity of sources)
  3. Extensive automation and integration (reduce manual effort; integrate with various security solutions)
  4. Alignment with organization and security use cases (collect and process only info that’s relevant to organization’s priorities; make intel easy to use)

Types and Sources

Operational (technical) intel

  • Knowledge about active attacks, events, campaigns
  • Used by defenders
  • Usually sourced from machines

Strategic intel

  • Broad overview of organization’s entire threat landscape
  • Business-oriented content for decision-making executives
  • Presented through reports or briefings
  • Must be created by humans
  • Sources: policy documents, news, white papers, research reports

The Security Intelligence Lifecycle

Security Intelligence Lifecycle

  1. Direction: set goals for security intel program
  2. Collection: gather info to address most important intel requirements
  3. Processing: transform collected info into usable format
  4. Analysis: turn info into intel to inform decisions
  5. Dissemination: get finished intel output to places it’s needed
  6. Feedback: understand requirements and priorities of consumers of intel, adjust your process accordingly

SecOps Intelligence Part 1 — Triage

Organizations can only investigate 48% of security alerts they receive, and of those investigated, only 26% are legitimate.

Vulnerability Intelligence

Most zero days are just variations on a theme, exploiting old vulnerabilities in slightly different ways. So rather than focusing on zero days, identify and patch vulnerabilities in software your organization uses.

If a vulnerability isn’t exploited within 2 weeks to 3 months after it’s announced, it’s unlikely that it will ever be exploited. So it’s not a priority to patch old vulnerabilities.

Your goal should not be to patch the most vulnerabilities, or even the most zero-day threats, but rather to identify and address the vulnerabilities most likely to be exploited against your organization.

The value of vulnerability databases is limited by their focus on technical exploitability rather than active exploitation, and that they’re updated too slowly to warn against rapidly-spreading threats.

By cross-referencing info from multiple sources, you can focus on vulnerabilities that present the greatest actual risk, rather than racing to patch everything.

Analytical Frameworks for Security Intelligence

Cyber Kill Chain

  • Describes 7 stages of attack: reconnaissance, weaponization, delivery, exploitation, installation, command and control, actions on objectives (exfiltration).
  • Doesn’t account for many modern attacks (e.g., phishing skips exploitation phase).

Diamond Model

  • Used to track attack groups over time, not progress of individual attacks.
  • The diamond for an attacker isn’t static; it evolves as attacker adjusts TTPs and changes infrastructure and targets.
  • Tracks adversary (attacker), capability, infrastructure (used by attacker), victim. Can also track phase, result, direction, methodology, resources.
  • Diamonds require a lot of maintenance, as aspects can change rapidly.

MITRE frameworks

  • Trusted Automatic Exchange of Intelligence Information (TAXII): transport protocol that enables organizations to share intel and use API commands to extract intel.
  • Structured Threat Information eXpression (STIX): standard format for presenting intel.
  • Cyber Observable eXpression (CybOX): method for tracking observables from cybersecurity incidents.

MITRE ATT&CK

  • Describes indicators and tactics associated with specific adversaries.
  • 12 tactic categories: initial access, execution, persistence, privilege escalation, defense evasion, credential access, discovery, lateral movement, collection, command and control, exfiltration, impact.

Developing Your Core Security Intelligence Team

Security intel team skills

  • Correlating external data with internal telemetry
  • Reverse-engineering malware and reconstructing attacks (forensics)
  • Providing threat situational awareness and recommendations for security controls
  • Proactively hunting internal threats
  • Educating employees and customers about cyber threats
  • Engaging with wider security intelligence community
  • Identifying and managing information sources

--

--

Chad Warner

Web Strategist at OptimWise. Cybersecurity & privacy enthusiast. Bookworm. Fan of Tolkien & LEGO.