9
Cyber Intelligence Repository Overview FS-ISAC SAWG 22Mar2013

Cyber Intelligence Repository - FS-ISAC Conceptual... · Faster Time to Action Connect, Filter, Structure, Distribute Aggregate & Add Context FS-ISAC Repository Structured Cyber Threat

  • Upload
    ngothu

  • View
    220

  • Download
    2

Embed Size (px)

Citation preview

Page 1: Cyber Intelligence Repository - FS-ISAC Conceptual... · Faster Time to Action Connect, Filter, Structure, Distribute Aggregate & Add Context FS-ISAC Repository Structured Cyber Threat

Cyber Intelligence Repository

Overview

FS-ISAC SAWG 22Mar2013

Page 2: Cyber Intelligence Repository - FS-ISAC Conceptual... · Faster Time to Action Connect, Filter, Structure, Distribute Aggregate & Add Context FS-ISAC Repository Structured Cyber Threat

SAWG (Repository) Introduction

• Driving forces in a changing InfoSec landscape – increase in malicious activity and level of sophistication across more attack surfaces

• Creates need for faster response time – gathering information is the first step – Improve sharing of cyber threat information capability

– In large volume, high quality, and as fast as possible

– Security standards are fundamental - TAXII, STIX, CybOX, etc.

• We are building a Repository to achieve a vision where disseminating critical security information is structured and near instantaneous

Page 3: Cyber Intelligence Repository - FS-ISAC Conceptual... · Faster Time to Action Connect, Filter, Structure, Distribute Aggregate & Add Context FS-ISAC Repository Structured Cyber Threat

InfoSec Sharing at Wire-Speed

FS-ISAC

Trusted Others

US CERT

FI

Other ISACs

DSIE

Other ISACs

FI

FI

FI

FI

FI

ISAC – Information Sharing Analysis Center FI – Financial Institution US-CERT – US Computer Emergency Response Team DSIE – Defense Security Information Exchange

Sharing Cyber-Intelligence with Trusted Partners •Standards based for machine-to-machine communication •Central ISAC repositories serve as hubs •“Internal Repositories” to connect, filter & distribute inside FIs

Page 4: Cyber Intelligence Repository - FS-ISAC Conceptual... · Faster Time to Action Connect, Filter, Structure, Distribute Aggregate & Add Context FS-ISAC Repository Structured Cyber Threat

Financial

Institution

Financial

Institution

Financial

Institution

STIX & TAXII Standards

FS-ISAC

Financial Institution

“Internal Repository”

Connecting FS-ISAC members with STIX & TAXII •Repository built on STIX expressive language •Utilizes TAXII services for transmission

Repository

STIX Constructs Utilized: •Observable (in CybOX)

› Artifacts › Sightings

•Indicator •TTP •Campaign •ThreatActor

[See Appendix on STIX for full list of Constructs]

Page 5: Cyber Intelligence Repository - FS-ISAC Conceptual... · Faster Time to Action Connect, Filter, Structure, Distribute Aggregate & Add Context FS-ISAC Repository Structured Cyber Threat

Faster Time to Action

Connect, Filter,

Structure, Distribute

Aggregate & Add

Context

FS-ISAC Repository Structured

Cyber Threat Intelligence

Detect – Structure – Share – Analyze – Action

Internal Organization

Detect Threats

Analyze Risk

“Internal Repository”

Respond Reduce

Other Sources

Actions

Speeding the flow of Threat Intelligence Ultimately, certain threat data will be automatically distributed, filtered/ analyzed, and made actionable.

Page 6: Cyber Intelligence Repository - FS-ISAC Conceptual... · Faster Time to Action Connect, Filter, Structure, Distribute Aggregate & Add Context FS-ISAC Repository Structured Cyber Threat

Road Map

Repository

Integration

Analysis

May 2013

Version 1.0 – FS-ISAC Summit Launch -TAXII enabled to download from Repository -Support of 7 Object Types

July 2013

Version 1.x – Machine to Machine -Full TAXII service up/ down loading -Anonymous Submissions -Many Object Types

Late 2013

Version 2.0 Attribution and Federation -TTP, Campaign and ThreatActor -Trust Groups -Synching

2012

Prior to Summit Mid-Late 2013

Implementing STIX Architecture

Version 2.0 -Email Targeting

Late 2013

Early Adopters -Pulling data from Repository

More Mainstream Adoption -Able to pull & push data with additional features

Page 7: Cyber Intelligence Repository - FS-ISAC Conceptual... · Faster Time to Action Connect, Filter, Structure, Distribute Aggregate & Add Context FS-ISAC Repository Structured Cyber Threat

What you are looking for Why were they doing it?

Who was doing it?

What were they looking to exploit?

What should you do about it?

Where was it seen?

What exactly

were they doing?

Why should you care about it?

Appendix – STIX 8 Constructs of Structured Threat Information eXpression (STIX) •Observable •Indicator •Tactics, Techniques, and Procedures (TTP) •Incident •ExploitTarget •Campaign •ThreatActor •Course of Action (COA)

Source: The MITRE Corporation, stix.mitre.org

Collaborative community-driven effort to define and develop a standardized language to represent structured cyber threat information. Intended to convey the full range of potential cyber threat information and strives to be fully expressive, flexible, extensible, automatable, and as human-readable as possible.

Page 8: Cyber Intelligence Repository - FS-ISAC Conceptual... · Faster Time to Action Connect, Filter, Structure, Distribute Aggregate & Add Context FS-ISAC Repository Structured Cyber Threat

Appendix – TAXII

Source: The MITRE Corporation, taxii.mitre.org

Trusted Automated eXchange of Indicator Information (TAXII) • Goal to facilitate the exchange of structured cyber threat information • Designed to support existing sharing paradigms in a more automated

manner • TAXII is a set of specifications defining the network-level activity of the

exchange

– Defines services and messages to exchange data

– Does NOT dictate HOW data is handled in the back-end, WHAT data is shared or WHO it is shared with

– TAXII is NOT a sharing program

Page 9: Cyber Intelligence Repository - FS-ISAC Conceptual... · Faster Time to Action Connect, Filter, Structure, Distribute Aggregate & Add Context FS-ISAC Repository Structured Cyber Threat

Thank You for Viewing!

SAWG