Sans Threat Intelligence Driven Attack Surface Management
Sans Threat Intelligence Driven Attack Surface Management
gh
Threat Intelligence-Driven Attack Surface
Ri
Management
ll
Fu
GIAC (GCTI) Gold Certification
ns
ai
Author: Jonathan Matkowsky, [email protected]
et
Advisor: Hamed Khiabani, Ph.D.
rR
Accepted: July 25, 2022
ho
ut
,A
Abstract
te
itu
Defenders struggle to keep up with the pace of digital transformation in the face of an
st
explains how ASM improves cyber resiliency in proactively detecting and responding to
weaknesses that adversaries could exploit to cause unacceptable harm. Defenders should
SA
prioritize ASM aligning with the business continuity and enterprise risk management
functions. A CTI-driven ASM conceptual framework (CTI-ASM) helps defenders achieve
e
Th
decision clarity on how best to prioritize preventing the most impactful exploitations
based on adversaries’ capabilities, opportunities, and intent. Security researchers have
22
implementation and support higher quality CTI. Potentially helpful decision analysis
tools and concepts include relevance diagrams, possibility and probability trees,
©
gh
Ri
1. Introduction
ll
This commentary suggests that a cyber threat intelligence (CTI)-driven attack
Fu
surface management (ASM) conceptual framework (CTI-ASM) may improve cyber
ns
resiliency against a continuously expanding enterprise modern attack surface (AS) and
ai
more sophisticated adversaries.
et
After discussing desirable features of CTI-ASM and possible technical tools,
rR
methods, and architectures to implement CTI-ASM, the commentary suggests that
ho
applying decision analysis methodology (DA) could improve both CTI-ASM and CTI.
ut
DA is a scientific method combining systems analysis and statistical decision theory for
,A
making rational decisions in complex, dynamic, and uncertain situations. (Howard &
Matheson, 1989).
te
itu
electronics detection, cyber system upgrades and maintenance (Collier et al., 2014), and
NS
intrusion detection architectures (Zbakh et al., 2015). They have more recently applied
DA with graph analytics for cyber system resiliency (Dwivedi, 2018), rank-weight
SA
methods for multi-criteria decision analysis (Gourisetti et al., 2020), dynamic information
e
processing (Hong, 2020), and simulations to improve risk thinking (Shreeve et al., 2021).
Th
22
gh
Ri
Fig. 1. Woodall, T. (2022). Modern Day AS. JPEG File.
Adversaries target any business units or functions within the enterprise to obtain
ll
Fu
unauthorized data access or disrupt services. (NIST, 2012b). The targeted AS not only
includes valuable data, intangible assets, and intellectual property more generally but also
ns
machine learning (ML) and artificial intelligence (AI), which as adversarial failures in
ai
et
ML and AI increase, will become more pressing (cf. Microsoft, 2020). By viewing the
rR
AS from the adversaries’ perspective [Fig. 1, supra], defenders may find the path of least
resistance that adversaries will target. The path of least resistance is any initial trajectory
ho
by which adversaries start causing harm through flaws discovered externally in enterprise
ut
assets. Other external forms of vulnerability require more than passive scanning—
,A
interactive probing or exchanging communications to spot weaknesses, such as social
te
engineering used in penetration testing.
itu
Assets partly define the AS within the established points that an adversary can
st
influence, access, or change to the possible detriment of the enterprise's mission, aims,
In
and priorities (cf. Barrett, 2018, p. 14). The AS is dynamic, though. It includes anybody,
NS
any place, and anything that is either supporting operations or furthering the strategic
SA
direction that the system is interacting with or connected to; this includes embedded
e
processors and controllers, telecommunication networks, and parts of the Internet. (Stine
Th
et al., 2021, p. 18; Joint Task Force, 2018, p. 16; NIST, 2011a, pp. 1, b3; NIST, n.d.).
22
Much like people and software they write, prone to errors, are targeted to get a
20
stronger foothold into an organization, supply chain systems are also part of the AS.
Protecting high-confidence bodies of training data, for instance, is a supply chain issue:
©
engineers reuse models trained by others because training algorithms are resource-
intensive (Microsoft, 2022h; Shankar et al., 2020). MITRE ATLAS case studies illustrate
how adversarial ML techniques can cause considerable damage to production ML.
(MITRE, n.d.).
Supply chain systems may integrate several technologies running on cyber-
physical infrastructures and digital system components (Yeboah-Ofori et al., 2021). It is
not just high-level systems. Post-SolarWinds (CVE-2021-35244, 2021), defenders should
secure the supply chain using software vulnerability assessment tools like MITRE’s
Software Assurance Platform (MITRE, 2022). Also, code vulnerabilities, such as from
gh
Ri
open-source software repositories relied on by developers, are part of the AS. (Microsoft,
2021c, p. 74; Wilburn & Schmidt, 2022).
ll
Fu
Finding the confines of a system affected by vulnerabilities is challenging because
it requires understanding what it means for one system to be part of another. (Spring,
ns
2022).
ai
et
rR
3. Challenges of protecting the attack surface
ho
Defenders struggle to keep up with the pace of harmful cyber activity converging
ut
with the speed of digital transformation.
,A
Cyber risk is already perceived ubiquitously as a top enterprise risk. (Kumar,
te
2022). Moreover, the number of incidents is only rising in tandem with a broadening
itu
Some say that before the Covid-19 outbreak, a business suffering a security
In
breach could permanently lose anywhere from twenty to forty percent of its customer
NS
base. (PCI Pal, 2019). As a result of the Covid-19 outbreak, organizations are even more
SA
vulnerable to cyber threats (McAfee & FireEye, 2021). They rushed to move their
operations online. (HBR, 2021, p. 2). “With legions of employees working from home
e
Th
and business processes quickly digitized, corporate information technology systems and
22
data stores suddenly grew in size and complexity, offering an expanded and enticing
[AS].” (HBR, 2021, p. 2). Global digital transformation is accelerating faster than during
20
the height of the pandemic and will likely continue for at least the next several years.
©
(IDC, 2022b).
gh
Ri
In addition, corporate data infrastructure and applications now run across multiple
clouds and hybrid environments (Badhwar, 2021, p. vii). As a result, even state-of-the-art
ll
Fu
firewalls and detection systems cannot alone safeguard corporate systems or
infrastructure behind a moat; the enterprise would remain connected to the Internet.
ns
(cf. Doerr, 2021). Furthermore, traditional perimeter defenses do not prevent adversaries
ai
et
from moving across the enterprise or steadily increasing access and control. (Doherty
rR
& McKenney, 2021, p. 1).
ho
The Internet has progressively and effectively become the new perimeter.
ut
(Sargent, 2022; Rose et al., 2020, p. 1).
,A
In addition, supply chain attacks prey on the fabric of mutual trust and
te
dependencies supporting the economy, such as NOBELIUM SolarWinds and HAFNIUM
itu
on-premises Exchange Server attacks (Microsoft, 2021c, pp. 1, 48, 58). Also, rapid and
st
systems and devices now regularly directly or indirectly interact with physical
environments, including industrial controls, building management and physical access
e
Th
electrical power, autonomous vehicles, drones, traffic flow, transit systems, and even
20
biological implants. (cf. Microsoft, 2021c, pp. 71, 79, 82). For instance, critical security
©
“The amount of potential attack surfaces, attack vectors, and avenues for cyber-
physical attacks is practically infinite.” (Hamilton, 2021). This control is partly why
ransomware payments in the United States have soared—hundreds of millions yearly.
(WSJ, 2022). There is potential for mass breaches of sensitive information and
gh
Ri
exploitations of critical memory allocation vulnerabilities that can crash systems across
many industries and verticals. For example, Cobalt Strike, commonly used in the public
ll
Fu
and private sector as a penetration testing platform to test a firm’s resiliency, has been so
widely deployed by adversaries that RiskIQ detects a command-and-control (C2) server
ns
more than hourly. (Ginty, 2022). Vulnerable end-of-life, unpatched, expired services and
ai
et
open ports are continuously in plain sight. (Ginty, 2022).
rR
Because there is no longer a single, easily identified perimeter for the enterprise,
ho
maintaining visibility requires an intentional extension of focus to monitor the
ut
proliferation of mobile devices, Bring Your Own Device, Internet of Things, and cloud
,A
computing. (Stine et al., 2020, p. 17). In addition, because most organizations embrace a
te
multi-cloud strategy, there is a growing AS of multi-cloud deployments of container
itu
approximately thirty percent more assets than they knew they owned. (Microsoft, 2022g).
SA
And the metaverse may be the surge on the horizon. The next generation of the
Internet beyond mobile and Web in an autonomous virtual shared space amplifies the
e
Th
existing AS. Devices that can be used as entry points threaten safety in the physical world
through massive data streams and sensors collecting brain wave patterns, facial
22
expressions, eye movements, hand movements, speech, and biometric features (Wang et
20
al., 2022). The metaverse blurs digital and physical boundaries. As a result, protecting
©
against Deepfake events will be more challenging, along with new challenges of
compliance, privacy, identity, and trust management. (Wang et al., 2022).
gh
Ri
Also, these days, state actors want to infiltrate vital institutions in the public
sector and private sector businesses that everyday households and local communities
ll
Fu
depend on for their personal and financial wellbeing. (cf., The White House, 2021).
ns
Even non-state actors regularly deploy advanced anti-forensics and can more
ai
precisely target our weakest points (Dehghantanha et al., 2019, pp. 3, 165). They steal
et
business model algorithms and inject payloads through mobile apps that poison deep
rR
learning models impairing child safety (Yale & Zonghao, 2021). They also target ML
ho
models widely used for cyber defense. (Beek, 2020). RiskIQ blocklists a newly detected
ut
malicious mobile app every five minutes (Microsoft, 2022f) and more than half a million
,A
new pieces of malware daily. (Ginty, 2022). Threat actors change their playbooks often,
te
use sophisticated anonymization, and commoditize sophisticated attack kits. (Microsoft,
itu
2021c, pp. 1, 8-9, 20). Some of these attacks begin and end within as little as an hour or
st
Last year alone, Microsoft observed more than ten billion malware threats, more
NS
than thirty-five billion phishing, other malicious emails, and over nine hundred brute
SA
force password theft attempts every second. (Jakkal, 2022). Cybercrime will cost over ten
trillion U.S. dollars annually by 2025. (Jakkal, 2022). Imagine if these costs could be
e
Th
avoided. It would be enough money for the U.S. government to distribute an annual
stimulus check for nearly thirty thousand dollars to every person in the United States.
22
Russian Federation’s attack on Ukraine and the resulting war further wrenched
©
cyber preparedness throughout Europe and the United States. European Chief
Information Security Officers (CISOs) are reassessing well-developed supply chain
security guidelines and are concerned they need stronger cyber resilience due to the war.
Likewise, almost half of U.S. CISOs expect to increase network protection because of the
war. (IDC, 2022a).
gh
Ri
requires continually analyzing and evaluating risks to corporate identities, devices,
applications, data, networks, infrastructure, and business functions under the assumption
ll
Fu
that the adversary is present in the environment. (Rose et al., 2020, p. 1; Microsoft,
2021c, p. 48). After all, incomplete knowledge of deployed systems and their patch state
ns
makes organizations more vulnerable to sudden large-scale attacks. (Microsoft, 2021c,
ai
et
p. 48).
rR
Because of the continuously expanding AS and more sophisticated adversaries,
insurance providers may expect continuous assessments and dynamic analysis to decide
ho
premiums and proper coverage. (cf. Badhwar, 2021, p. 328). Also, given the challenge of
ut
protecting an enterprise from harmful cyber activity, public companies must consider the
,A
impacts of foreseeable cyber breaches, anecdotally exemplified by Bridgestone and
te
Toyota choosing to proactively shut down parts of operations until they could better
itu
understand how cyber risk was affecting their operations. (Harvard, 2022).
st
In
Gone are the days when protecting the perimeter through antivirus, firewalls, and
NS
Karen, 2022).
Th
exposure cost-effectively (Freund & Jones, 2014, chap. 14) by combining practices and
20
Naarananoja, 2014, p. 97). ASM helps protect against decentralized and independent
solutions whose architectures and records are not optimally compatible with performance
measurement. Performance measurement is an essential element of ASM reporting
progress and finding gaps. (cf. Kazmi & Naarananoja, 2014, p. 98).
gh
Ri
are often a root cause of compromised systems. (Diogenes & Shinder, 2018, Ch. 1).
“Indeed, Gartner predicts that by 2025, more than 85% of successful attacks against
ll
Fu
enterprise users will exploit configuration and user errors in legacy systems.” (Gartner,
2021a, p. 4).
ns
ai
4.2. Business continuity and enterprise risk management
et
Defenders may gather insights from the business continuity management (BCM)
rR
function on how and what to prioritize protecting, especially for evaluating and
ho
considering the probable frequency and size of acceptable future losses (Freund & Jones,
ut
2014; ISO, 2020, p. 2). For example, BCM may help to define the types of and the extent
,A
to which disruption is tolerable across a range of possible negative consequences for the
te
organization: reputational damage, operational harm, contractual damages, monetary loss,
itu
legal repercussions, regulatory fines, and failure to deliver on business goals or lost
st
In addition, ASM may gain insights from the enterprise risk management (ERM)
NS
function within the organization (Joint Task Force, 2018, p. iv, Stine et al., 2020, p. 4).
SA
Evaluating the criticality and sensitivity of enterprise assets shapes the proper risk
tolerance. (Stine et al., 2021, p. 18). Coordinating with ERM would help ensure risk
e
Th
alignment of resources with the organizational mission and vision and may help ERM
protect shareholder value. (COSO, 2017, pp. 2, 5).
22
Coordinating with ERM is also important because cyber risks interlock with
20
various other types of enterprise risks. (cf. NIST, 2016c). “[Such] incidents can have
©
gh
Ri
4.3. Continuous Visibility
Whether continuous visibility comes from a mature VuM program as part of ASM
ll
Fu
or from ASM software and managed services, ASM requires constant visibility into all
ns
the enterprise endpoints and assets. ASM focuses on managing adversaries' uncertain
potential negative impact, understanding how adversaries exploit vulnerabilities, and
ai
et
neutralizing the exploitations by reducing the AS. (Smith, 2022).
rR
Assets include embedded devices and servers, cloud services, source code, pre-
ho
deployed code, software platforms, virtual machines, applications, and their dependencies
and sources, components, operating systems, firmware, and which software and versions
ut
,A
those assets run down to the level of package and libraries (Souppaya & Karen, 2022;
Diamond et al., 2022).
te
itu
For instance, ASM should supply continuous visibility of cloud assets across a
multi-cloud environment to spot any misconfigurations or vulnerable components and
st
In
understand how a potential adversary may try to exploit them. (Estrin, 2022). After all,
adversaries weaponize cloud resources to harm other target systems because of poor
NS
security hygiene, such as sharing public key secrets in a public cloud. For instance, bots
SA
will scan for keys leaked into log files on Continuous Integration and Continuous
e
Delivery (CI/CD) services used for automation in building, testing, and deployment of
Th
applications and in Git repositories, such as GitHub, to steal these keys (Diogenes &
22
discover internet-facing enterprise assets and systems and associated vulnerabilities” that
©
adversaries would want to exploit (Shoard & Handa, 2021, p. 10)—even before any
intrusion, during the reconnaissance stage. (Hutchins et al., 2011). Otherwise,
adversaries may be trying to maintain persistence or act on their objectives by the time
they are detected. ASM organizes information enabling decisions on how to address the
threats of adversaries’ uncertain potential adverse impact and improve continuously.
(Barrett, 2018, p. 6).
For example, defenders may prefer integrating relevant detection queries based on
ASM priorities into an extended detection and response (XDR) solution with security
orchestration, automation, and response (SOAR) capabilities. (Microsoft, 2020). This
gh
Ri
integration would use automation and ML or hunter-trained AI to collect, correlate, and
analyze relevant data across the enterprise environment—including endpoints, email
ll
Fu
traffic, applications, virtual machines, and identities.
After all, to meet the increased demands for digital interfaces and services and
ns
support a hybrid work environment, ASM must use expert-assisted AI, ML, and
ai
et
automation to effectively manage security risks at scale. (HBR, 2021, pp. 4, 8). For
rR
instance, ASM may automatically surface and apply mitigation to vulnerable devices,
software, files, and container images running in the cloud that use an affected Log4j
ho
component. (Microsoft, 2021f).
ut
Defenders should also be able to discover attack surfaces in website paths and
,A
covert vulnerabilities in payloads with ASM. (cf. Yan et al., 2022). In addition, ASM
te
software should be able to consolidate AS vectors from multiple scanners to detect cross-
itu
site scripting vulnerabilities and other security issues in Java web applications and PHP
st
gain initial access and non-technical vulnerabilities, such as exposed personal or access
SA
information in open-source data (Roy et al., 2022). ASM then helps contextualize how
e
specific vulnerabilities from across the host, application, and network layers, when
Th
sequentially combined, become more effective for the adversary (Roy et al., 2022; Spring
22
et al., 2021).
20
ASM should illuminate what the adversary would target during the
reconnaissance stage (Hutchins et al., 2011) when trying to infiltrate the organization.
©
(Shoard & Handa, 2021, p. 4). This ASM feature is sometimes called “External ASM”
(Microsoft, 2021e). External ASM can detect vulnerabilities that the adversary would
want to use to gain an initial foothold and drop remote access toolkits, activate hands-on-
keyboard attacks, exfiltrate data, and deploy ransomware through libraries on devices,
software files, and components. (cf. Microsoft, 2022d)
gh
Ri
control or the benefit that the adversary would stand to gain, how easy it would be to get
started, the specific impacts on human safety, if applicable, or the company’s mission.
ll
Fu
(Spring, 2022).
Even after fine-tuning ASM based on BCM and ERM inputs, it appears from
ns
computational modeling applicable to modern systems that programmers cannot produce
ai
“a pragmatically useful piece of software…without vulnerabilities,” which are “countably
et
rR
infinite.” (Spring, 2022, pp. 11-12). Therefore, the technical details of specific
vulnerabilities are not as helpful without understanding which vulnerabilities are likely to
ho
be used at any exact time and in a particular organization (Spring, 2022, p. 17). CTI-
ut
ASM helps contextualize how to prevent vulnerabilities from being exploited beyond the
,A
technical severity offered through Common Vulnerability Scoring System (CVSS).
te
Also, teams cannot focus on all threats, or they will get burned out. (Godyla &
itu
Nickels, 2021). With CTI-ASM, defenders can use CTI assessments to prioritize
st
intent in conducting their harmful cyber activity. (cf. Brown & Lee, 2021).
NS
public and private cloud and hybrid. (cf. Microsoft, 2021b). This way, defenders can not
Th
only detect and block malicious components of a single operation but also of a campaign
22
gh
Ri
embedded AI and ML) should similarly be self-critical, continuously striving to find
evidence to confirm the weaknesses in any of its insights or convictions.
ll
Fu
Process-wise, CTI production starts with collecting and evaluating cyber threat
information in its source and reliability through rigorous and structured tradecraft
ns
techniques using all-source knowledge and substantive experience. (Security Intel, n.d.).
ai
It is an “intelligence-driven” method to detect rapidly, respond to, and recover from
et
rR
threat events aimed at safeguarding assets (Stine et al., 2021, p. 26). CTI-ASM collects
information on threats and threat actors from various technical and human means (Kriaa
ho
& Chaabane, 2021, p. 113) and expresses this comprehension in a structured way using
ut
proper analysis techniques. (Schaberreiter et al., 2019).
,A
CTI-ASM is cyclical. Data collection is planned, implemented, and evaluated
te
using systematized analytic skills. It distributes and reevaluates the resulting intelligence
itu
based on feedback from a wide range of data collection sources, such as Kusto Query
st
Language (KQL) queries (Microsoft, 2022c) for unusual processes that may have
In
restructures the collection and fills intelligence gaps. (cf. Security Intel, n.d.). Human
SA
evidence, about proactive and reactive cyber defensive measures. (cf. CIS, 2021a).
Th
CTI-ASM derives actionable insights into how adversaries plan, conduct, and
22
sustain their operations. It engages in direct attribution or profiling the type of threat actor
20
using a robust and reliable set of considerations. CTI-ASM decides the malicious
activity’s scope, origin, and direction, assesses a timestamp, and evaluates the adversarial
©
goals, aims, and TTPs (tactics, techniques, and procedures). (Mavroeidis et al., 2021,
p. 328).
CTI-ASM streamlines the collection and processing through automation that frees
up analyst time needed to use CTI for awareness of the AS. (cf. Brown & Lee, 2019, p.
15). For instance, last year, local governments found they could cut down the time
needed to take defensive measures from days to a few minutes by taking part in a pilot
project testing an automated data feed of potential network compromises. (CIS, 2021a).
This speed tends to be critical when dealing with hybrid attacks across multiple domains.
For instance, blocking an adversary in the cloud from running malicious code on an
gh
Ri
endpoint will not stop the attacker from doing it again if they already have gained
persistence in the cloud. However, automation tools, fusing actionable intelligence across
ll
Fu
domain boundaries, remediating all affected assets, and improving the security
configurations prevent a recurrence. (Microsoft, 2022a).
ns
Applying ML techniques and algorithms to CTI properties can improve the
ai
et
accuracy of threat prediction analysis and hypothesis generation (Elitzur et al., 2019,
rR
p. 47). Such an application also helps find foreseeable vulnerabilities in the supply chain
(e.g., ransomware and spear-phishing) and helps to apply reasonable controls. (Yeboah-
ho
Ofori et al., 2021). In addition, ML and data mining have successfully analyzed malware
ut
and detected anomalous networks, including analyzing Border Gateway Protocol
,A
behavior. (Dehghantanha et al., 2019, pp. 3, 67). Similarly, Microsoft uses statistical
te
methods to track threat actors and TTPs (Microsoft, 2021a).
itu
and act wisely against more advanced forms of harmful cyber activity. (Dehghantanha et
In
al., 2019, p. 3). ML derives risk scenarios from potential threats and vulnerabilities in
NS
crucial assets contributing to the AS. CTI-ASM will assess the derived risk scenarios on
SA
their impacts and frequency of effects. (Stine et al., 2021, pp. 32-33).
e
and knowledge bases of observed adversary tactics and techniques. (Stine et al., 2021,
20
p. 26).
CTI formats in CTI-ASM include frameworks, standards, scoring, and
©
gh
Ri
CTI-ASM may ingest real-time CTI indicator feeds by using the Trusted
Automated Exchange of Intelligence Information (TAXII) application protocol for
ll
Fu
transmitting STIX data from a TAXII server (cf., CIS, 2021d). It also uses “attacker
behavior modeling” to understand attack schemes and improve detection and analytic
ns
competencies. (cf. Elitzur et al., 2019, p. 41). Using threat modeling, CTI-ASM helps
ai
et
focus on what an adversary wants to target (cf. Godyla & Nickels, 2021), such as by
rR
generating probabilistic attack graphs using CTI data. (Gylling et al., 2021). These graphs
have successfully stopped ransomware actors just two minutes into an attack. (Microsoft,
ho
2021a).
ut
A CTI-ASM architecture of an XDR solution with SOAR capabilities based on
,A
zero trust architecture supplies cyber-situational awareness of events (Doherty &
te
McKenney, 2021, p. 3) to reduce the AS. This CTI-ASM architecture continuously
itu
watches assets for insights and anomalous patterns. (cf. Open Group, 2021). In addition,
st
it grows telemetry to have increased visibility of the evolving relevant holdings of all
In
types. (cf. Open Group, 2021). Furthermore, it prioritizes based on risk analyses informed
NS
by current information on active threat actors and technical attack techniques. (cf. Open
SA
Group, 2021).
e
time, CTI-ASM helps to compose realistic adversary simulation scenarios (cf. CTID,
22
Exposures) through the lens of ATT&CK adversary behaviors within CTI-ASM may
help supply the necessary context. (CTID, 2021c). Specifically, how adversaries use
©
gh
Ri
other election offices use a firewall block list and prevent the same attack within seconds.
(CIS, 2021b).
ll
Fu
By deploying CTI-ASM, defenders may apply AS reduction rules in a SIEM
(Security Information Event Management) or XDR to help prioritize vulnerabilities and
ns
misconfigurations to block entry vectors and lateral movements more effectively
ai
et
(Microsoft, 2022i; Microsoft, 2022d). For instance, CTI-ASM may apply AS reduction
rR
rules to critical remote code execution vulnerabilities discovered in specific versions of
Apache’s Log4j software library (Log4Shell) that adversaries use to take control of many
ho
affected systems. (CISA, n.d.). In addition, CTI-ASM may inform defenders of incidents
ut
that may need more scoping. (Microsoft, 2022d).
,A
CTI-ASM may curate threat indicator feeds using a CTI platform that loads into a
te
SIEM or XDR-SOAR (Microsoft, 2021d) to provide context for understanding how to
itu
There are tools to enrich and help visualize CTI-ASM data, such as the msticpy
In
set of Python tools (MSTIC, 2021). Much of the msticpy package is agnostic to the data
NS
source. For example, Microsoft designed msticpy for use in Jupyter notebooks. Jupyter is
SA
returns the output of code it executes from what a user types into a cell. (Microsoft,
Th
2019).
22
Msticpy includes data providers and pre-built queries for easy access to security
20
data stores, CTI, and geo-location queries to supply context (e.g., clustering, time series
analysis, anomaly identification, base64 decoding, and IOC pattern extraction). With
©
msticpy, CTI-ASM analysts can pivot to derive additional indicators for additional
context and use the CTI lookup class to search for an individual or multiple indicators of
compromise (IOC) from one or more CTI providers. Msticpy also includes mechanisms
to visualize event timelines, process trees, mapping, charts, and time series. (Microsoft,
2019).
gh
Ri
DA tools may help ensure that CTI-ASM incorporates an appropriate risk attitude
(cf. Howard & Abbas, 2016, ch.11). They also help ensure that CTI-ASM priorities
ll
Fu
reflect a unified corporate risk tolerance and not the risk tolerance of only specific
individuals within an organization. (Howard & Abbas, 2016, pp. 781-85). The risk
ns
tolerance of specific individuals differs depending on where the individual sits. (Howard
ai
et
& Abbas, 2016, pp. 781-85). While there may be a significant first struggle to gather the
rR
relevant risk information and organizational data, this material can be resourcefully
reused and only refreshed intermittently. (Spring, 2022).
ho
DA relevance diagrams may help understand the current state of information and
ut
assert irrelevance relations to avoid logical errors in assessments. (cf. Howard & Abbas,
,A
2016, Ch. 7). Also, while information gathering is necessary for CTI, a suitable value
te
may be placed using DA on even imperfect information to avoid wasteful information
itu
gathering and ensure that the information’s significance is not relevant and material and
st
Distinctions made in CTI should help reach decision clarity; many observable
NS
differences are not particularly useful because they supply no benefit. (Howard & Abbas,
SA
2016, pp. 84-85). Possibility trees standing for multiple distinctions—from one degree to
compound possibilities —may help drive clarity. (Howard & Abbas, 2016, p. 87).
e
Th
CTI deals with measures of belief or probabilities that depend on the state of
22
certainty through many distinctions, each having multiple degrees. The assessment may
sometimes change by knowing that certain degrees of other distinctions have occurred.
©
(Howard & Abbas, 2016, Ch. 6). Sensitivity analysis may help decide whether more
investigation is necessary and may be used to clarify how the assessment would change if
certain predicates changed in the decision basis. (Howard & Abbas, 2016, ch.12).
CTI often relies on multiple sources of information, requiring an assessment of
the relevance relations between them because joint information can be higher than, less
than, or equal to the sum of data value from individual sources. (Howard & Abbas, 2016,
p. 397). DA relevance diagrams and probability trees may help in this regard as well.
(Howard & Abbas, 2016, ch.18).
gh
Ri
The methodology of generating CTI assessments, much like DA, requires careful
attention to cognition, which is the process that turns perceptions into beliefs. (cf.
ll
Fu
Howard & Abbas, 2016, p. 351). Based on cognitive psychology, for instance, one cause
of cognitive biases causing opinions to reflect perceptions improperly is wishful
ns
thinking—forming beliefs based on what should be, rather than on evidence and letting a
ai
et
particular worldview affect our thinking process. (Howard & Abbas, 2016, p. 351).
rR
Another is the misuse of the availability heuristic, which claims that the easier it is to
think of an event, the more likely it is to happen, such as using more current information
ho
to blow events out of proportion. (Howard & Abbas, 2016, p. 351). Another thinking
ut
error is estimating probabilities based on often incorrect similarity judgments that
,A
misinterpret the effect of uncertainty rather than first separating prior information from
te
new evidence and then processing the data using probability theory. (Howard & Abbas,
itu
2016, p. 352). Another cognitive bias relevant to CTI from DA is forming beliefs
st
prematurely, letting our first ideas play too large a role in deciding our final assessments.
In
Like DA, CTI must consider the tendency of implicitly conditioning probability
SA
on the occurrence of uncertain events. (cf. Howard & Abbas, 2016, p. 354). Also, like
e
DA, CTI must safeguard against the hidden effects of subconscious motivation, such as
Th
when self-interest influences beliefs. (cf. Howard & Abbas, 2016, p. 355). Motivational
22
biases can also occur within CTI teams, such as differing incentive structures tending to
20
“While there is no definitive index, over 200 cognitive biases have been
identified in psychology, sociology, and management research.” (Mohanani et al., 2020,
sec. 1). Cognitive biases are essential to be aware of as they can affect CTI quality and
CTI-ASM.
7. Conclusion
This commentary offers a conceptual framework of CTI-ASM to improve cyber
resiliency. In addition, this commentary hopefully will encourage researchers to explore
CTI-ASM further, thus serving as a basis for future research.
gh
Ri
Empirical research is needed to study CTI-ASM in its real-world contexts by
collaborating with defenders applying CTI-ASM in day-to-day work.
ll
Fu
Future research may include a systematic literature review (Siddaway et al., 2019)
of DA case studies that apply relevance diagrams, examine corporate risk attitudes, weigh
ns
imperfect information, use possibility and probability trees or sensitivity analysis, or
ai
et
address cognitive and motivational biases. Based on the review, research may experiment
rR
to test the hypothesis that bridging a gap between DA and CTI-ASM would improve the
quality of CTI-ASM and CTI.
ho
ut
,A
te
itu
st
In
NS
SA
e
Th
22
20
©
gh
Ri
Acknowledgements
ll
Fu
Thanks to all my Microsoft colleagues for valuable feedback and to Mark Seiden and Jonathan Spring,
who helped me improve this commentary’s quality. Views expressed do not necessarily reflect the
ns
opinions of Microsoft or any contributor.
ai
References
et
rR
Ahmed, D. (2022, July 21). Critical vulnerability in popular GPS tracker lets hackers
ho
remotely control vehicles. HACKREAD. Retrieved from
ut
https://www.hackread.com/vulnerability-gps-tracker-hackers-remotely-control-
vehicles/
,A
te
Badhwar, R. (2021). Dynamic measurement of cyber risk. In The CISO’s next frontier.
itu
doi.org/10.1007/978-3-030-75354-2_40
st
doi.org/10.6028/NIST.CSWP.04162018
SA
Brown, R., & Lee, R. M. (2019). The evolution of cyber threat intelligence (CTI): 2019
20
Center for Internet Security Intel & Analysis Working Group [Security Intel]. (n.d.).
What is cyber threat intelligence? [Blog post]. perma.cc/5P7X-GSBW
Center for Internet Security [CIS]. (2021, January 12) [2021a]. Automated cyber threat
intelligence pilot reduced states' response times to minutes [Blog post].
perma.cc/7JQ3-NVBE
Central Intelligence Agency [CIA]. (n.d.). United States. Central Intelligence Agency -
CIA. cia.gov/the-world-factbook/countries/united-states/#people-and-society Last
updated 15 June 2022
gh
Ri
CIS. (2021, June 15) [2021a]. Cybersecurity spotlight - Cyber threat indicator sharing
[Blog post]. perma.cc/9T34-DVFK
ll
Fu
CIS. (2021, June 25) [2021b]. A new vision for cyber threat intelligence at the MS-ISAC
[Blog post]. perma.cc/C3HN-S7CS
ns
CIS. (2021, November 19) [2021c]. Real-time indicator feeds [Blog post].
ai
et
perma.cc/Q2RD-NG7J
rR
The Center for Threat-Informed Defense [CTID] (2021, May 3) [2021a]. ATT&CK for
containers.perma.cc/RKM7-UUCZ
ho
CTID. (2021, October 14) [2021b]. ATT&CK workbench. perma.cc/ZN7H-3BQ8
ut
CTID. (2021, October 28) [2021c]. Mapping ATT&CK to CVE for impact.
perma.cc/EN4V-XU9A
,A
te
CTID. (2022, March 2). Attack flow. perma.cc/VF3Y-EB4H
itu
Collier, Z. A., DiMase, D., Walters, S., Tehranipoor, M.M., Lambert, J. H., & Linkov, I.
NS
perma.cc/F4TV-P7BX
20
Dehghantanha, A., Conti, M., & Dargahi, T. (2019). Cyber threat intelligence. Springer.
Diogenes, Y., & Shinder, T. (2018). Microsoft Azure security center. Microsoft Press.
Diamond, T., Kerman, A., Souppaya, M., Stine, K., Johnson, B., Peloquin, C., Ruffin, V.,
Simon, M., Sweeney, S., Scarfone, K. (2022) Improving enterprise patching for
general IT systems: Utilizing existing tools and performing processing in better ways.
NIST, NIST Special Publ. 1800-31. doi.org/10.6028/NIST.SP.1800-31
Doerr, E. (2021, July 12). Microsoft to acquire RiskIQ to strengthen cybersecurity of
digital transformation and hybrid work [Blog post]. perma.cc/Q4LN-ZA3Z
gh
Ri
Doherty, D., & McKenney, B. (2021). Zero trust architectures: are we there yet? (21-
1273). MITRE. perma.cc/FB27-7Q96
ll
Fu
Dwivedi, A (2018) Implementing cyber resilient designs through graph analytics assisted
model-based systems engineering. 2018. IEEE Int’l Conference on Software Quality,
ns
Reliability and Security Companion (QRS-C). doi.org/10.1109/qrs-c.2018.00106
ai
et
Elitzur, A., Puzis, R., & Zilberman, P. (2019). Attack hypothesis generation. 2019
rR
European Intelligence and Security Informatics Conference (EISIC). doi:
10.1109/EISIC49498.2019.9108886.
ho
Estrin, E. (2022). Cloud security handbook. Packt Publishing.
ut
Gartner Enterprise Risk Management Research Team [Gartner]. (2021, March 29)
,A
[2021a]. 2021 ERM risk response accelerator for cyber risks — topic guide: ERM’s
te
role and frameworks (ID No. G00743265 -). [GARTNER is a registered trademark
itu
and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally
st
Gartner. (2021, March 29) [2021b]. 2021 ERM Risk Response Accelerator for Cyber
NS
Risks — Topic Guide: Controls, Threats, and Consequences (ID No. G00748842)
SA
perma.cc/Y85L-LRB4
e
Ginty, S. (2022, April 20). Discover the anatomy of an external cyberattack surface with
Th
Godyla, N., & Nickels, K. (2021, June 22). Strategies, tools, and frameworks for building
20
gh
Ri
Harvard Business Review [HBR]. (2021, July 19). Pulse survey | Cybersecurity in the
era of intelligence and an expanding attack surface. Analytic Services.
ll
Fu
perma.cc/HRC3-XRVK
Harvard Law School Forum on Corporate Governance [Harvard]. (2022, April 11).
ns
Proposed SEC cyber rules: A game changer for public companies. perma.cc/BXF6-
ai
et
6V7G
rR
Heuer, R. J. (2019). Psychology of intelligence analysis. Pickle Partners Publishing.
Hong, Z., Li, S., & Yu, L. (2020). Accelerating update of approximations under a
ho
dominance relation. IEEE Access, 8, 146472-
ut
146482. doi.org/10.1109/access.2020.3015813
,A
Howard, R. A., & Abbas, A. E. (2016). Foundations of decision analysis global edition.
te
Harlow, England: Pearson Education Limited.
itu
Howard, R. A., & Matheson, J. E. (1989). Readings on the principles and applications of
st
chains. Lead. Issues Inf. Warf. Secur. Res. 2011, 1, 80. perma.cc/DN4K-XQLE
e
IDC. (2022, April 27) [2022a]. Global cybersecurity market implications of the Russia-
Th
IDC. (2022, May 12) [2022b]. Worldwide digital transformation investments forecast to
20
reach $1.8 trillion in 2022, according to new IDC spending guide. perma.cc/UCQ3-
KF4J
©
gh
Ri
Kazmi, S. A., & Naarananoja, M. (2014). Significance of management system for
effective organizational management. GSTF International Journal on Business
ll
Fu
Review (GBR), 3(2). doi.org/10.7603/s40706-013-0022-2
Kriaa, S., & Chaabane, Y. (2021). SecKG: Leveraging attack detection and prediction
ns
using knowledge graphs. 2021 12th International Conference on Information and
ai
et
Communication Systems (ICICS). doi: 10.1109/ICICS52457.2021.9464587
rR
Kumar, S. (2022, March 3). Cybercrime: A clear and present danger. Security Magazine.
perma.cc/6T7S-UCSS
ho
Lee, R. M., & Brown, R. (2021). 2021 SANS Cyber Threat Intelligence (CTI) Survey.
ut
perma.cc/SU9Z-BR44
,A
Lin, H., Burnett, D., Sheaffer, D.A., & Arnold, E. (2009). Applying decision analysis
te
process to exterior physical security system technology design and selection. 43rd
itu
doi: 10.1109/CCST.2009.5335519
In
Mavroeidis, V., Hohimer, R., Casey, T., & Jesang, A. (2021). Threat actor type inference
NS
McAfee Enterprise [McAfee], & FireEye. (2021, November 9). Cyber threats have
Th
McMillan, R., Poulsen, K., & Volz, D. (2022, March 28). Secret world of pro-Russia
20
gh
Microsoft (2021, October) [2021c]. Microsoft digital defense report – Microsoft security.
Ri
perma.cc/AY24-ZQ73
ll
Fu
Microsoft (2021, November 18) [2021d]. Connect your threat intelligence platform to
Microsoft Sentinel. perma.cc/8MM7-DU9R
ns
Microsoft (2021, November 19) [2021e]. External attack surface management: Intelligent
ai
et
defense in the age of digital transformation. perma.cc/UA9H-4VYA
rR
Microsoft. (2021, December 11) [2021f]. Guidance for preventing, detecting, and hunting
for exploitation of the Log4j 2 vulnerability. perma.cc/JY7A-8WYQ
ho
Microsoft (2022, January 11) [2022a]. Inside Microsoft 365 defender: Mapping attack
ut
chains from cloud to endpoint. Microsoft Security Blog. perma.cc/55B5-UXXD
,A
Microsoft (2022, March 7) [2022c]. Kusto query language (KQL) overview- Azure data
te
explorer | Microsoft docs. perma.cc/3VVG-ZFN6
itu
Microsoft (2022, April 19) [2022f]. The mobile attack surface goes beyond major mobile
st
Microsoft (2022, April 19) [2022g]. Anatomy of an external attack surface: Threat actors
NS
perma.cc/GSE5-MZGR
e
cybercrime gig economy and how to protect yourself. Microsoft Security Blog.
22
perma.cc/EBW7-U9SK
20
Microsoft (2022, May 11) [2022h]. Failure Modes in Machine Learning - Security
documentation | Microsoft Doc. perma.cc/AX6S-A8HZ
©
Microsoft (2022, May 17) [2022i]. Understand and use attack surface reduction (ASR).
Developer tools, technical documentation, and coding examples | Microsoft Docs.
perma.cc/D9DH-T55Z
Microsoft (2022, June 14) [2022e]. Threat intelligence integration in Microsoft Sentinel.
Developer tools, technical documentation, and coding examples | Microsoft Docs.
perma.cc/2S6G-L7LS
Microsoft Threat Intelligence Center [MSTIC]. (2021, April 27). MSTICPy v1.0.0 and
Jupyter notebooks in Azure Sentinel, an update. perma.cc/9ANN-QL3T
gh
Ri
Ming Li, Weijia Jia and Wei Zhao, "Decision analysis of network-based intrusion
detection systems for denial-of-service attacks," 2001 International Conferences on
ll
Fu
Info-Tech and Info-Net. Proceedings (Cat. No.01EX479), 2001, pp. 1-6 vol.5,
doi.org/10.1109/ICII.2001.983485.
ns
The MITRE Corp. [MITRE] (2021, June 22). CVE- cve-2021-35244. perma.cc/LGF4-
ai
et
2CKH
rR
MITRE (2022, February 10). After SolarWinds, tamper proofing the cyber ecosystem.
perma.cc/HNX5-7TY8
ho
MITRE (n.d.). MITRE ATLAS™ (adversarial threat landscape for artificial-intelligence
ut
systems) case studies. perma.cc/JX5S-LGEF
,A
MITRE (n.d.). MITRE ATT&CK®. perma.cc/GWW8-NTCC
te
R. Mohanani, I. Salman, B. Turhan, P. Rodríguez and P. Ralph, "Cognitive Biases in
itu
Software Engineering, vol. 46, no. 12, pp. 1318-1339, 1 Dec. 2020, doi:
In
10.1109/TSE.2018.2877759
NS
security risk organization, mission, and information system view (U.S. Dept. of
e
NIST (2012b). Guide for Conducting Risk Assessments, NIST Special Publ. 800-30.
22
NIST. (n.d.). Attack surface - Glossary | CSRC. NIST Computer Security Resource
Center | CSRC. perma.cc/92GL-KU27
Parkinson, S., Crampton, A., & Hill, R. (2018). Guide to vulnerability analysis for
computer networks and systems: An artificial intelligence approach [Springer
Computer Communications and Networks series (CCN)]. doi.org/10.1007/978-3-319-
92624-7
PCI Pal. (2019, Sept. 17) [Press Release]. New global research shows poor data security
practices have serious consequences for businesses worldwide. perma.cc/YL3K-
96BN
gh
Ri
Pete Shoard and Shilpi Handa. (2021). Hype Cycle for Security Operations, 2021 (ID No.
G00747546). perma.cc/6XBU-LPEF
ll
Fu
Rose, S., Borchert, O., Mitchell, S., Connelly, S. (2020). Zero Trust Architecture, NIST,
NIST Special Publ. 800-207. doi.org/10.6028/NIST.SP.800-207
ns
Roy, S., Sharmin, N., Acosta, J. C., Kiekintveld, C., & Laszka, A. (2022). Survey and
ai
et
taxonomy of adversarial reconnaissance techniques. ACM Computing Surveys.
rR
doi.org/10.1145/3538704
Sargent, J. (2022, February 16). Security perimeter is no more as attack surface continues
ho
to expand. SD Times. perma.cc/2PSY-8K4F
ut
Schaberreiter, T., Kupfersberger, V., Rantos, K., Spyros, A., Papanikolaou, A., Ilioudis,
,A
C., & Quirchmayr, G. (2019). A quantitative evaluation of trust in the quality of cyber
te
threat intelligence sources. Proceedings of the 14th International Conference on
itu
Schlette, D., Caselli, M., & Pernul, G. (2021). A comparative study on cyber threat
In
Shankar, R., Kumar, S., & Johnson, A. (2020, October 22). Cyberattacks against machine
e
learning systems are more common than you think [Blog post]. perma.cc/PQW3-
Th
CADE
22
Shreeve, B., Hallett, J., Edwards, M., Anthonysamy, P., Frey, S., & Rashid, A. (2021).
“So if Mr blue head here clicks the link...” risk thinking in cyber security decision
20
29. doi.org/10.1145/3419101
Siddaway AP, Wood AM, Hedges LV. How to do a systematic review: a best practice
guide for conducting and reporting narrative reviews, meta-analyses, and meta-
syntheses. Annu Rev Psychol 2019 Dec 4;70:747-770 doi.org/10.1146/annurev-
psych-010418-102803
Silver, G. (2021, April 26). Managing cybersecurity risk: four options for CEOs, CFOs,
and risk officers. Forbes Technology Council. perma.cc/V2CF-ZXUK
gh
Ri
Souppaya, M., Karen, S. (2022). Guide to enterprise patch management planning:
preventive maintenance for technology. (NIST), NIST Special Publ. 800-40, Rev. 4.
ll
Fu
doi.org/10.6028/NIST.SP.800-40r4
Stine, K.M., Quinn, S.D., Ivy, N., Feldman, L., Witte, G.A., & Gardner, R. (2020)
ns
Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management
ai
et
(ERM). (NIST), NISTIR 8286. doi.org/10.6028/NIST.IR.8286
rR
Stine, K.M., Quinn, S.D., Ivy, N., Barrett, M., Feldman, L., Witte, G.A., & Gardner, R.
(2021) Identifying and Estimating Cybersecurity Risk for Enterprise Risk
ho
Management (ERM). (NIST), NISTIR 8286A. doi.org/10.6028/NIST.IR.8286A
ut
Smith, G. S. (2022). The new normal in IT: How the global pandemic changed
,A
information technology forever. Wiley.
te
Spring, J., Hatleback, E., Householder, A., Manion, A., & Shick, D. (2021). Time to
itu
doi:10.1109/MSEC.2020.3044475.
In
The Open Group. (2021). Zero trust commandments (“Open Group”). perma.cc/M2UQ-
e
AZG5
Th
Wang, Y., Zhou, N. Z., Zhang, N., Liu, D., Xing, R., Luan, T. H., & Shen, X. (2022,
22
doi.org/10.48550/arXiv.2203.02662
The White House. (2021, October 1). Statement by President Joe Biden on cybersecurity
©
gh
Ri
Yin, Z., Xu, Y., Ma, F., Gao, H., Qiao, L., & Jiang, Y. (2022). Scanner++: Enhanced
vulnerability detection of web applications with attack intent synchronization. ACM
ll
Fu
Transactions on Software Engineering and Methodology. doi.org/10.1145/3517036
Zbakh, M., Elmahdi, K., Cherkaoui, R., & Enniari, S. (2015). A multi-criteria analysis of
ns
intrusion detection architectures in cloud environments. 2015 International
ai
et
Conference on Cloud Technologies and Applications (CloudTech).
rR
doi.org/10.1109/cloudtech.2015.7336967
ho
ut
,A
te
itu
st
In
NS
SA
e
Th
22
20
©