SlideShare a Scribd company logo
#RSAC
SESSION ID:
David McGrew Jyoti Verma
Making Threat Intelligence
Actionable: Recommending
Responses with STIX
ANF-R04
Technical Leader
Cisco Systems
Fellow
Cisco Systems
@mcgrewAnalog
#RSAC
Introduction
#RSAC
Security process cycle
3
Response
Detection
Monitoring
#RSAC
Poll
 What is the mean time to detect cyber threats in your organization
?
 < 3 hours
 < 3 days
 < 3 weeks
 < 3 months
4
https://pollev.com/mrti
#RSAC
Response
5
 Investigate
 Obtain more information about a threat
 Mitigate
 Block, but not eliminate, a threat
 Remediate
 Fix or eliminate a threat
#RSAC
Poll
 What is the mean time to contain/remediate cyber threats in your
organization ?
 < 3 hours
 < 3 days
 < 3 weeks
 < 3 months
6
https://pollev.com/mrti
#RSAC
Connecting detection to response
7
 There may be multiple detection sources
 There may be multiple response systems
 A human should be in the loop
 Or have that option
 Processes should be automatable
 One-click approval
#RSAC
Connecting detection to response
8
Cloud Threat Analytics
Local Threat Analytics
Network Controller
Endpoint Protection
#RSAC
Threat Intelligence Aggregator
9
Cloud Threat Analytics
Local Threat Analytics
Network Controller
Endpoint Protection
TIA SIEM
#RSAC
Threat Intelligence Aggregator
10
Cloud Threat Analytics
Local Threat Analytics
Network Controller
Endpoint Protection
TIA SIEM
TI
#RSAC
Threat Intelligence Aggregator
11
Threat type
Risk
Host security group
Reputation
Rules Engine
Recommended CoA
#RSAC
Rule
Engine
Threat Intelligence Aggregator
12
Threat type
Risk
Host security group
Reputation
Recommended CoA
#RSAC
Rules
13
Risk Threat Type Default Suggested Course of Action
8-9 malware using automatically generated domain (DGA) Block compromised host
8-9 malware using url-string as communication channel (C&C) Block compromised host
8-9 malware using https communication channel Block compromised host
8-9 malware downloading suspicious file Block compromised host
7-8 malware using repetitive requests Contain compromised host
7 malware downloading malicious file Contain compromised host
6-7 misuse of web proxy auto discovery protocol (WPAD) Tag host as suspicious and inspect through IPS
6 anonymization software (TOR) Tag host as suspicious and inspect through IPS
5 remote desktop connection Inspect host traffic through IPS
3 Skype Inspect host traffic through IPS
#RSAC
Manual
14
Incident detected
Determine Course of Action
Determine console to use for CoA
Enter CoA data into console
ok?
Monitor
#RSAC
Manual Semiautomated
15
Incident detected
Determine Course of Action
Determine console to use for CoA
Enter CoA data into console
ok?
Monitor
Incident detected
Approve or select Course of Action
ok?
Monitor
#RSAC
Network actions
 Investigate
 Inspect with IPS: SPAN, TAP, SDN copying or redirection
 Netflow/IPFIX monitoring
 Packet capture
 Mitigate
 Perimeter blocking: BGP black hole, DNS sinkhole, ACL
 Interior blocking: 802.1X Change of Authorization, ACL
 Containment: VLAN tagging, SGT tagging
 Remediate
 Containment to remediation server or service
16
#RSAC
Endpoint actions
 Investigate
 Scan endpoint
 Mitigate
 Kill process, Delete file
 Remediate
 Reimage host, Remove software, Reinstall software
17
#RSAC
#RSAC
Poll
What is STIX?
 Structured Threat Information eXchange
 Structured Threat Information eXpression
 Some Thing In XML
19
https://pollev.com/mrti
#RSAC
Poll
What is STIX?
 Structured Threat Information eXchange
 Structured Threat Information eXpression
 Some Thing In XML
20
https://pollev.com/mrti
#RSAC
What is STIX?
21
Incident
Indicator
Observable
Course of Action
Tactics, Techniques, Procedures
Campaign
Exploit Target
Threat Actor
#RSAC
Why use STIX between detection & response?
 Standard for communicating threat info between elements
 Human and machine readable
 Standard definitions
 Normalized measures of risk and likelihood
22
#RSAC
Pros and Cons of STIX
23
PROS CONS
Very comprehensive list of
elements to build IoCs
Limited commercial adoption
Support for “free text” and
comments
Fairly verbose and complex schema
Integration with CAPEC and MAEC
for robust IoCs
Course of Actions needs further
definition to be useful
Vendor neutral
#RSAC
STIX Extensions
#RSAC
Extending CourseOfActionType
25
1. Expanded vocabulary with specific network action types
• Block
• Contain
• Inspect
• Packet Capture
2. Added priority for the actions
#RSAC
STIX Course Of Action Indicator - SuggestedCOA Incident - RequestedCOA Incident - COATaken
Action target Cybox Observable tied to
Indicator
• URL
• Email addresses, subjects
• Files
• DNS domain names
• IP addresses
1. Cybox Observable
tied to Incident
2. Incident Victim
• IP address
• MAC address
1. Cybox Observable
tied to Incident
2. Incident Victim
External threats Internal threats
26
Course of Actions along the attack continuum
AFTERDURINGBEFORE
#RSAC
NetworkStructuredCOAType
27
#RSAC
BLOCK
28
Types:
1. Perimeter block
2. Internal block
Actions:
1. Network ACL
2. BGP black-hole
3. DNS sink-hole
What is needed to apply this rule?
 Matching traffic (5 tuple)
 Action (Alert, Drop, Deny, Log, Pass, Reject)
DNS
ACL
ACL
#RSAC
29
TCP, UDP, ICMP, ANY
NetworkStructuredCOAType - Block Type
#RSAC
BLOCK
30
Types:
1. Perimeter block
2. Internal block
Actions:
1. Network ACL
2. BGP black-hole
3. DNS sink-hole
What is needed to apply this rule?
 Reflect router on which the static
route will be applied
DNS
#RSAC
BLOCK
31
Types:
1. Perimeter block
2. Internal block
Actions:
1. Network ACL
2. BGP black-hole
3. DNS sink-hole
What is needed to apply this
rule?
 Custom DNS server
DNS
#RSAC
CONTAIN
32
Remediation:
1. VLAN Containment
2. Security Group
Tagging
What is needed to apply this
rule?
 VLAN Profile
VLAN Tag
Other requirements
 Network infrastructure to handle VLANs
DNS
VLAN
40
VLAN
10
VLAN
10
VLAN
10
#RSAC
33
NetworkStructuredCOAType - ContainType
#RSAC
34
ContainType - Remediation
#RSAC
CONTAIN
35
Remediation:
1. VLAN Containment
2. Security Group
Tagging
What is needed to apply
This rule?
 Security Group Profile
Security Group Tag
Security Group ACL
Other requirements
 Security Group Policy enforcer
 Network devices that can handle tags
DNS
SGT
16
SGT
1
SGT
1
SGT
1
SGACL
SGT
2
#RSAC
CONTAINMENT TO HONEYNET
36
What is needed to apply this rule?
 Permissible IP list
 Traffic description (5 tuple)
• Source port, Destination port,
Source IP, Destination IP, Protocol
 Routes
• Prefix, next hop, next hop type
DNS
Honeypot
#RSAC
37
TCP, UDP, ICMP, ANY
ContainType - HoneyPot
#RSAC
INSPECTION ON DEMAND
38
What is needed to achieve this?
 Inspection profile
 Inspection Server
 Encapsulations – GRE, VXLAN etc.
#RSAC
39
GRE, VXLAN
GRE, VXLAN
NetworkStructuredCOAType - InspectType
#RSAC
40
TCP, UDP, ICMP, ANY
PacketCaptureType
#RSAC
Threat Analytics
API
Workflow
41
Network
Controller
SIEM
Identity
Services
Engine
TIA
#RSAC
Threat Analytics
API
1. Export incidents in
a given time range
Workflow
42
Network
Controller
SIEM
Identity
Services
Engine
TIA
#RSAC
Workflow
43
API
2. STIX report for exported
incidents with suggested
course of actions
Threat Analytics
Network
Controller
SIEM
Identity
Services
Engine
TIA
#RSAC
Workflow
44
API
Threat Analytics
Network
Controller
SIEM
Identity
Services
Engine
TIA
3. Trigger response
using SIEM
#RSAC
Workflow
45
4. SDN & ISE TD
system responds
Threat Analytics
Network
Controller
SIEM
Identity
Services
Engine
TIA
API
#RSAC
Demonstration
#RSAC
Future work
47
Threat Analytics
Network
Controller
SIEM
Identity
Services
Engine
TIA
API
5. SIEM feeds back COA
Taken to TIA
6. TIA updates incident
with COA Taken
#RSAC
Summary
 STIX can be used to recommend actionable responses
 Machine readable: actionable
 NetworkStructuredCOA used for investigation, mitigation, and
remediation
48
#RSAC
Apply what you have learned
 In the next week
 Identify detection and response systems within your organization that
could use an actionable CoA
 Determine if those elements are using STIX
 Over the next three months
 Provide feedback to the STIX community
 Experiment with STIX CoA definition and software
49
#RSAC
Thanks for your attention
#RSAC
STIX extensions
<xs:complexType name="NetworkStructuredCOAType" abstract="true”>
<xs:extension base="coa:StructuredCOAType">
<xs:choice>
<xs:element name="Inspect" type="network_coa:InspectType" minOccurs="0"/>
<xs:element name="PacketCapture" type="network_coa:PacketCaptureType" minOccurs="0"/>
<xs:element name="Block" type="network_coa:BlockType" minOccurs="0"/>
<xs:element name="Contain" type="network_coa:ContainType" minOccurs="0"/>
</xs:choice>
</xs:extension>
</xs:complexType>
51

More Related Content

PDF
How To Avoid The Top Ten Software Security Flaws
PDF
Achieving Defendable Architectures Via Threat Driven Methodologies
PDF
Implementing An Automated Incident Response Architecture
PDF
Westjets Security Architecture Made Simple We Finally Got It Right
PDF
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
PDF
Threat Intelligence Is Like Three Day Potty Training
PDF
Tools Of The Hardware Hacking Trade Final
PDF
Breaking and entering how and why dhs conducts penetration tests
How To Avoid The Top Ten Software Security Flaws
Achieving Defendable Architectures Via Threat Driven Methodologies
Implementing An Automated Incident Response Architecture
Westjets Security Architecture Made Simple We Finally Got It Right
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Threat Intelligence Is Like Three Day Potty Training
Tools Of The Hardware Hacking Trade Final
Breaking and entering how and why dhs conducts penetration tests

What's hot (20)

PDF
Security precognition chaos engineering in incident response
PDF
Attacks on Critical Infrastructure: Insights from the “Big Board”
PDF
Threat intel- -content-curation-organizing-the-path-to-successful-detection
PDF
Cloud Breach – Preparation and Response
PDF
Pulling our-socs-up
PDF
Advanced red teaming all your badges are belong to us
PDF
Soc 2030-socs-are-broken-lets-fix- them
PDF
Insights from-NSAs-cybersecurity-threat-operations-center
PDF
MITRE ATT&CKcon 2018: Detection Philosophy, Evolution & ATT&CK, Fred Stankows...
PDF
Predicting exploitability-forecasts-for-vulnerability-management
PDF
Rapid Threat Modeling Techniques
PDF
Top 10 Bad Coding Practices Lead to Security Problems
PDF
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
PDF
From IT to IoT: Bridging the Growing Cybersecurity Divide
PPTX
Unraveling Detection Methodologies: Indicators vs. Anomalies vs. Behaviors
PDF
A New Security Paradigm for IoT (Internet of Threats)
PDF
Beyond the mcse red teaming active directory
PDF
MITRE ATTACKCon Power Hour - December
PDF
ICS Network Security Monitoring (NSM)
PDF
MITRE ATT&CKcon 2018: VCAF: Expanding the ATT&CK Framework to cover VERIS Thr...
Security precognition chaos engineering in incident response
Attacks on Critical Infrastructure: Insights from the “Big Board”
Threat intel- -content-curation-organizing-the-path-to-successful-detection
Cloud Breach – Preparation and Response
Pulling our-socs-up
Advanced red teaming all your badges are belong to us
Soc 2030-socs-are-broken-lets-fix- them
Insights from-NSAs-cybersecurity-threat-operations-center
MITRE ATT&CKcon 2018: Detection Philosophy, Evolution & ATT&CK, Fred Stankows...
Predicting exploitability-forecasts-for-vulnerability-management
Rapid Threat Modeling Techniques
Top 10 Bad Coding Practices Lead to Security Problems
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
From IT to IoT: Bridging the Growing Cybersecurity Divide
Unraveling Detection Methodologies: Indicators vs. Anomalies vs. Behaviors
A New Security Paradigm for IoT (Internet of Threats)
Beyond the mcse red teaming active directory
MITRE ATTACKCon Power Hour - December
ICS Network Security Monitoring (NSM)
MITRE ATT&CKcon 2018: VCAF: Expanding the ATT&CK Framework to cover VERIS Thr...
Ad

Viewers also liked (13)

PDF
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...
PDF
Janeiro 2017
PDF
Syair siti sianah
PDF
PDF
(120804) #fitalk field device
PPT
Gliding Contest Scoring: current and proposal 8.1.4 for the 2016 IGC plenary
PDF
North Atlantic fucoids in the light of global warming
PPTX
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
PPTX
Pit fall in typhoid fever 2016
DOC
PDF
DB Spr 2015
PDF
Ιστορία Δ΄ 3. Κλασικά χρόνια 2. Ο χρυσός αιώνας 22. ΄΄ Η καθημερινή ζωή και η...
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...
Janeiro 2017
Syair siti sianah
(120804) #fitalk field device
Gliding Contest Scoring: current and proposal 8.1.4 for the 2016 IGC plenary
North Atlantic fucoids in the light of global warming
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Pit fall in typhoid fever 2016
DB Spr 2015
Ιστορία Δ΄ 3. Κλασικά χρόνια 2. Ο χρυσός αιώνας 22. ΄΄ Η καθημερινή ζωή και η...
Ad

Similar to Making Threat Intelligence Actionable Final (20)

PDF
Keeping Up with the Adversary: Creating a Threat-Based Cyber Team
PDF
str-w04_next-wave-of-security-operationalization
PDF
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
PDF
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
PDF
Building a Cyber Security Operations Center for SCADA/ICS Environments
PDF
Aujas incident management webinar deck 08162016
PPTX
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
PPTX
Incident Response: Validation, Containment & Forensics
PDF
IOCs Are Dead—Long Live IOCs!
PPTX
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
PDF
DevSecOps in Baby Steps
PDF
DevSecOps in Baby Steps
PDF
CONFidence2015: Real World Threat Hunting - Martin Nystrom
PPTX
Nist 800 53 deep dive 20210813
PDF
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
PDF
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
PDF
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
PDF
2020 11-15 marcin ludwiszewski - purple, red, blue and others - rainbow team...
PPTX
Cyber Defense Matrix: Revolutions
PPT
Security Capability Model - InfoSec Forum VIII
Keeping Up with the Adversary: Creating a Threat-Based Cyber Team
str-w04_next-wave-of-security-operationalization
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
STIX, TAXII, CISA: Impact of the Cybersecurity Information Sharing Act of 2015
Building a Cyber Security Operations Center for SCADA/ICS Environments
Aujas incident management webinar deck 08162016
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Incident Response: Validation, Containment & Forensics
IOCs Are Dead—Long Live IOCs!
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
DevSecOps in Baby Steps
DevSecOps in Baby Steps
CONFidence2015: Real World Threat Hunting - Martin Nystrom
Nist 800 53 deep dive 20210813
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
2020 11-15 marcin ludwiszewski - purple, red, blue and others - rainbow team...
Cyber Defense Matrix: Revolutions
Security Capability Model - InfoSec Forum VIII

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPT
Teaching material agriculture food technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
A Presentation on Artificial Intelligence
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Machine learning based COVID-19 study performance prediction
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
KodekX | Application Modernization Development
PPTX
Cloud computing and distributed systems.
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Understanding_Digital_Forensics_Presentation.pptx
Teaching material agriculture food technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
A Presentation on Artificial Intelligence
Diabetes mellitus diagnosis method based random forest with bat algorithm
Machine learning based COVID-19 study performance prediction
Spectral efficient network and resource selection model in 5G networks
Per capita expenditure prediction using model stacking based on satellite ima...
The AUB Centre for AI in Media Proposal.docx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
MYSQL Presentation for SQL database connectivity
Dropbox Q2 2025 Financial Results & Investor Presentation
KodekX | Application Modernization Development
Cloud computing and distributed systems.
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Advanced methodologies resolving dimensionality complications for autism neur...

Making Threat Intelligence Actionable Final