The Hermeneutics of Cyber Threat Intelligence Part 3: Planning and Curation
What does a Greek god, a German philosopher, and a Museum Curator have to teach us about Cyber Threat Intelligence?
Sharing communities like MM-ISAC share information and intelligence using the Traffic Light Protocol (TLP). Official information on what it is and how and when to use it can be found here: https://www.first.org/tlp/
MM-ISAC was formed by a few mining companies in 2017 after a series of cyber attacks on several mining companies carried out by the same threat actor. The ISAC was formed when the CISOs and Security Directors got together and decided that companies not sharing this information are at a disadvantage to the threat actors. Threat actors are innovating by leveraging new technologies and collaborating by sharing information on tactics and techniques. Simply put, as defenders, we must do a better job of sharing information and collaborating in this environment and landscape.
Traffic Light Protocol is a sharing protocol with an emphasis on sharing. Its purpose is to enable the broadest sharing of information possible. So that we can collaborate and cooperate more effectively on the defense side, the classification levels determine how and with whom you may share this information.
TLP: CLEAR may be published and shared anywhere:
Share via Non-Public Online channels.
Share with those who need to know.
Share via Non-Public Online channels with controlled Access.
Limits Sharing to the Recipient Organization Only.
Share via Non-Public online channels with controlled access.
Only for the Intended Recipient. Do not share further.
Typically shared via secured out-of-band channels.
Intelligence is about making better choices in how we defend ourselves. It’s so we know what may be coming. Threat actors typically recycle tactics that work well for them; knowing this information can help us better prepare our defences and update our responses accordingly.
Classifying Intelligence with the fewest possible restrictions is crucial so it can be shared as widely as possible.
Many CTI professionals come from intelligence and government backgrounds where security classifications are imposed to keep and maintain secrecy; thus, many overclassify by default. TLP has a different objective: to enable sharing. In information sharing, the risk is overclassification rather than under-classification.
Overclassifying limits and restricts how and with whom information may be shared. This overclassification will stifle sharing and collaboration. Want a whole industry of defenders working on the same problem or picture? We cannot do that if we continue to overclassify what we share.
The first step in determining TLP classification is to consider the source. Is this information from online or open sources, clients, peers, public or private organizations?
TLP classification should be directly aligned with the sensitivity of the information being shared. Remember, TLP is a sharing protocol that aims to disseminate information as widely and openly as possible. If the intelligence's source is open source, such as information published online in a news article, the classification is always CLEAR. It does not matter which platform you may have retrieved it from; the source of the intelligence determines the classification.
If intelligence comes from a member or client, that client determines the level of sharing with which they feel comfortable.
There may be good reasons to place restrictions on the share, such as:
One strategy to increase the potential for sharing is to share anonymously, omitting sensitive and identifying information. For example, focus the share on the attacker’s information, such as:
A particularly infuriating example of overclassifying that I see regularly from CTI and TIP vendors is overclassifying open-source intelligence. I see vendors using TLP: AMBER+Strict on open-source Intelligence scraped from public news articles to make information appear more sensitive or valuable, or worse, the AI that scraped the data and generated the report is "proprietary." The best advice for vendors who want to market their platforms or products in this space is to demonstrate that they understand the proper usage of TLP.
The purpose of the Traffic Light Protocol is to enable us, as a cybersecurity community, to better share intelligence and facilitate collaboration. It is essential to maintain the confidentiality of information to protect the individuals and organizations that share it. It is also vital not to overclassify intelligence so that we are not at a disadvantage when defending against cyber threats.
What does a Greek god, a German philosopher, and a Museum Curator have to teach us about Cyber Threat Intelligence?
Why? Why? Three letters, one powerful question. We all ask why. Possibly the very first question you've ever asked anyone was, "Why?"
We live in very polarizing times, particularly in the US. We choose our words carefully, tiptoe around topics that might devolve into argumentation...