The Threat Hunt Process
The Threat Hunt Process
(THP) Roadmap
A Pathway for Advanced Cybersecurity Active Measures
◆◆◆
Copyright 2019, Syber-Risk.com, All Rights Reserved
Washington, DC ∞ Tucson, AZ
DEDICATION
January 2019:
First Edition-B
Revision History for
the First Edition
2019: First Release
The Syber-Risk.com Logo is a registered trademark of Syber-Risk.com LLC. The Threat Hunting
Process (THP) Roadmap. While the publisher and the authors have used good faith efforts to ensure
that the information and instructions contained in this work are accurate, the publisher and the authors
disclaim all responsibility for errors or omissions, including without limitation responsibility for
damages resulting from the use of or reliance on this work. Use of the information and instructions
contained in this work is at your own risk. If any code samples or other technology this work contains
or describes is subject to open source licenses or the intellectual property rights of others, it is your
responsibility to ensure that your use thereof complies with such licenses and/or rights.
Any mention or discussion of any registered ® cybersecurity product is only for educational purposes.
There mention is neither a recommendation or promotion of the product. Your company or agency
should conduct its own due diligence and market surveys to identify the most appropriate tools for your
environment.
Join us at https://cybersentinel.tech
This free resource is available to everyone interested in
the fate and future of cybersecurity in the 21st Century
ALSO SEE THE AUTHOR’S EBOOK: Huawei Technologies: Chinese
Risk to the International Supply Chain at:
https://cybersentinel.tech/product/ebook-huawei-technologies-chinese-risk-
to-the-international-supply-chain/
The Threat Hunt Process
(THP) Roadmap
Table of Contents
PART I - The Strategic View of the
Threat Hunt Process (THP)
Introduction
What is Risk?
The Difference Between an ‘Event’ and an
‘Incident’
The Threat is China
The Threat Hunt Process
Threat Inputs
Hunt Activity
Conduct Review
Event/Incident Outputs
THP Decision Tree Activities
Hunt Request (Externally-focused)
Hunt Guidance
Base Hunting (Internally-focused)
Metrics
Weekly Metrics
Monthly Metrics
Annual Metrics
Qualitative versus Quantitative Metrics
PART II - Tactical Activities of the
Threat Hunt Process
The THP Tactical Methodology
PART III - Appendices
Appendix A – Relevant Terms and
Glossary
Appendix B – Continuous Monitoring’s
Importance to the THP
Appendix C -- Can the Human “Poet”
Bring Value to Predictive Analysis?
About the Author
PART I - The Strategic View of the Threat Hunt
Process (THP)
Introduction
The Cybersecurity Threat Hunting Process (THP) is an active and
coordinated effort between the Incident Response (IR) and the Cyber
Threat Intelligence (CTI) teams. It is not OFFENSIVE and is specifically
used to confirm whether an occurrence becomes an event. Based upon
available intelligence, an event may or may not be raised to a defined
incident. The IR team will determine whether the event should be raised to
an actual incident for timely and actual response activities working with
CTI. The IR team may or may not direct a hunt be initiated and will make
that determination based on the potential or actual level of risk posed by the
intrusion.
EVENT INCIDENT
(less defined/initial occurrence) (defined/confirmed/high impact)
The Incident Response Spectrum describes the major activities that the
IR team may implement—the offense, or a hack-back is seldom authorized
or recommended against the threat[1] of each part of the spectrum as found
below. THP coordinates its actions with the IR team, reviews the available
Cybersecurity Threat Intelligence (CTI), and works with system
administrators, coders, and forensics analysts to locate, mitigate, and stop
any malicious activities. THP is that first-line of defense by internal experts
to respond rapidly to threats to the Information Technology (IT)
environment.
The Threat Hunting Process (THP) may be used by both public
agencies and private companies. This is a resource intensive operation, and
typically is sought by medium and large size companies needing to protect
its information, sensitive data, Intellectual Property or government data
from unauthorized access. The THP further defines how the hunting
process functions and interacts with other functions and processes. These
processes provide Cybersecurity Analysts (CyA), both within the CTI and
Hunt teams, with a method to identify malicious activity throughout the
operational IT environment.
Major elements of THP are identified below in Graphic 1. This
provides a high-level overview of the various cybersecurity functions with
a specific emphasis on the Hunt process.
The process provides high-confidence, repeatability, and identification
of both cybersecurity events and incidents. The business case development
process provides feedback to the THP to improve incident response
personnel actions with a defined capability to conduct follow-on responses
and forensic activities. The THP receives inputs primarily[2] from the
following four areas:
1. Cyber Threat Intelligence (CTI)
2. Automated Tool
3. Business Case Development
4. Incident Response (IR)
What is Risk?
Risk Threat
Definition Definition
A measure of the extent to which an Any circumstance or event with the
entity is threatened by a potential potential to adversely impact organizational
circumstance or event, and typically a operations (including mission, functions,
function of: (i) the adverse impacts that image, or reputation), organizational assets,
would arise if the circumstance or event individuals, other organizations, or the
occurs; and (ii) the likelihood of Nation through an information system via
occurrence. Information system-related unauthorized access, destruction, disclosure,
security risks are those risks that arise modification of information, and/or denial
from the loss of confidentiality, of service.
integrity, or availability of information
or information systems and reflect the
potential adverse impacts to
organizational operations (including
mission, functions, image, or
reputation), organizational assets,
individuals, other organizations, and
the Nation.
Also, many will confuse risk with threat and use the terms
interchangeably. A threat, be it an intentional threat such as a hacker, or
natural disaster, is a subset of risk. The Risk Management Framework
(RMF) created by NIST is based on active knowledge, recognition, and a
plan to address by the business or agency to provide a reportable and
repeatable mechanism that creates the real success of the concept of “risk
management.” This is not “risk elimination;” it is about an active means to
manage risk, and any associated threats over time.
The standard cybersecurity equation for risk can be computed as following:
Conclusion
Huawei is a complex threat. Lachow reserves this label to highly
coordinated and effective state actors with nearly unlimited resources.
Huawei is such a threat with the obligatory skill-sets to a very diverse and
technologically capable adversary. With the presumptive backing of the
Chinese government, and its resources, Huawei continues to be a major threat
to US and international governments and their respective economies.
While there is no conclusive or public evidence, that China through
its surrogate Huawei has injected malicious coding into any of its products,
the risk is formidable. Michael Maloof, a former senior security policy
analyst in the Office of the Secretary of Defense, ascribes from sources that
“[t]he Chinese government reportedly has "pervasive access" to some 80
percent of the world's communications, thanks to backdoors it has ordered to
be installed in devices made by Huawei” (Protalinski, 2012). Jim Lewis, at
the Center for Strategic and International Studies provides an ominous point
of view working with Chinese businesses: “The Chinese will tell you that
stealing technology and business secrets [are] a way of building their
economy, and that this is important for national security” (Metz, 2013). The
risk to the US’s national security, its economic viability, and its critical
infrastructure is directly threatened by the Chinese regime.
References for “The Threat is China”
Ahrens, N. (2013, February). China's Competitiveness: Myth, Reality and Lessons for the
United States and Japan. Retrieved from Center for Strategic and International
Studies:
http://csis.org/files/publication/130215_competitiveness_Huawei_casestudy_Web.pdf
Barbozaaug, D. (2010, August 22). Scrutiny for Chinese Telecom Bid. Retrieved from New
York Times: http://www.nytimes.com/2010/08/23/business/global/23telecom.html?
_r=0
DNI. (2015, February 26). Statement of Record: Worldwide Threat Assessment. Retrieved
from http://www.armed-services.senate.gov/imo/media/doc/Stewart_02-26-15.pdf
Infosec Institute. (2013, October 11). Hardware attacks, backdoors and electronic
component qualification. Retrieved from Infosec Institute:
http://resources.infosecinstitute.com/hardware-attacks-backdoors-and-electronic-
component-qualification/
Krekel, B. (2009, October 9). Capability of the People’s Republic of China to Conduct
Cyber Warfare and Computer Network Exploitation. Retrieved from George
Washington University:
http://nsarchive.gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-030.pdf
Lachow, I. (2008). Cyber Terrorism: Menace or Myth. Cyber Power, 19-20.
Mandiant. (2013, February 18). APT1: Exposing One of China's Cyber Espionage Units.
Retrieved from Mandiant:
http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf
Metz, C. (2013, December 31). U.S. to China: We Hacked Your Internet Gear We Told You
Not to Hack. Retrieved from Wired: http://www.wired.com/2013/12/nsa-cisco-
huawei-china/
Nakashima, E., & Peterson, A. (2014, June 9). Report: Cybercrime and espionage costs
$445 billion annually. Retrieved from Washington Post:
http://www.washingtonpost.com/world/national-security/report-cybercrime-and-
espionage-costs-445-billion-annually/2014/06/08/8995291c-ecce-11e3-9f5c-
9075d5508f0a_story.html
Protalinski, E. (2012, July 14). Former Pentagon analyst: China has backdoors to 80% of
telecoms. Retrieved from ZDNet: http://www.zdnet.com/article/former-pentagon-
analyst-china-has-backdoors-to-80-of-telecoms/
Scissors, D. P. (2013 , May 9). Chinese Investment in the U.S.: Facts and Motives.
Retrieved from Heritage Society:
http://www.heritage.org/research/testimony/2013/05/chinese-investment-in-the-us-
facts-and-motives
Simonite, T. (2012, October 9). Why the United States Is So Afraid of Huawei. Retrieved
from MIT Technology Review:
http://www.technologyreview.com/news/429542/why-the-united-states-is-so-afraid-
of-huawei/
US House of Representatives. (2012, October 8). Investigative Report on the US National
Security Issues Posed by Chinese Telecommunications Companies Huawei and
ZTE. Retrieved from
https://intelligence.house.gov/sites/intelligence.house.gov/files/documents/Huawei-
ZTE%20Investigative%20Report%20(FINAL).pdf
“Hunts” follow the process outlined below. This ensures that all
hunts provide feedback and value to the company, business, or agency.
They require a consistent and repeatable response. The THP also requires
“continual improvement” element like many mainstream development
processes such as the Information Technology Information Library®
(ITIL). Continual improvement requires, for example, after-action
meetings, training, and outside third-party evaluation on a recurring basis;
these are but several measures designed to improve the organizations’
cybersecurity threat response activities and capabilities.
Threat Inputs
These include:
1. FireEyes’s ® publicly shared IOC’s of Github at:
https://github.com/fireeye/iocs
2. The DHS shares Joint Indicator Bulletins at: https://www.us-
cert.gov/ncas/bulletins
3. DHS also offers Automated Indicator Sharing (AIS). More
information on how to integrate with these services may be found
at: https://www.dhs.gov/ais
4. Crowdstrike® also offers IOC access via its Falcon Query API.
More information can be found at:
https://www.crowdstrike.com/blog/tech-center/import-iocs-
crowdstrike-falcon-host-platform-via-api/
5. Also, work being done in Artifical Intelligence (AI) by the
company Cylance® is also providing cutting-edge approaches for
end-point protection. See www.cylance.com
Hunt Activity
Hunt
Hunts are typically focused against external attackers but may also include
“insider threat” activities. Using the inputs, a CyA will initiate a THP
activity/hunt upon direction. The hunt consists of selecting the proper tools
to use, collecting the data from the tools, analyzing the results, and
documenting the outcomes. Analysts will make use of either existing tools,
or by creation or procurement of new tools to fulfill the needs of the hunt.
Gaps in tool capabilities should be documented and reviewed by corporate
or agency leadership. This may include Senior IR Personnel or specialized
experts to include the assigned Chief Information Security Officer (CISO).
CyA perform an iterative process by querying the selected tools, reviewing
the data, filtering out known or non-malicious behavior and re-querying the
data. This continues until malicious activities are found.
Base Hunts
Base hunts are typically internally focused on compliance from within the
IT environment. It is defined as repeatable searches based on an analytical
methodology that produces low-fidelity results (i.e., results that require
analyst review and cannot be fully automated as a rule). These hunts will
reside in the MHTDB. Base hunts, for example, may leverage tools such
as FireEye HX® technology. This technology obtains endpoint
intelligence that may include, but is not limited to, Windows Services
listing, Windows Scheduled Task listing, Windows Registry Run keys,
and the Windows Application Compatibility Cache. The tool will help to
determine whether any alteration or manipulation of these key services
and may lead to follow-on review and correction by trained personnel.
Outcomes
All hunts will end in one of three outcomes. Based on the outcome of the
hunt, an analyst will document the results accordingly and distribute to
other functions and processes as necessary.
1. Nothing Discovered
No indication of active compromise or behavior violating identified best
practices, acceptable use, or organizational policies discovered during the
hunt.
2. Something Found: Non-Malicious
Violation(s) of acceptable use or organizational policy discovered during
the hunt.
3. Something Found: Malicious
An active or historic compromise, which may currently or have previously
placed, IT assets, or its data at risk, is discovered.
Conduct Review
Event/Incident Outputs
Incident Response
If the hunt began from information collected from an IR function,
providing feedback to that team helps improve its output. The IR team will
be notified immediately following the verification of a malicious event in
an information system or network.
R Hunt Team
RACI
A Hunt Team
Lead
C Trigger
Source(s)
I Trigger
Source(s)
IOC - Recommendation
to Hunt
The CTI function will
provide IOCs to the hu
team and issue a
recommendation to hun
when a moderate-to-hi
level of analyst
confidence is obtained.
IOC – No
Recommendation to Hu
The CTI function will
periodically provide
IOCs to the hunt team
that do not include a
recommendation to hun
when a low-to-modera
level of analyst
confidence is obtained.
The hunt team perform
further evaluation whe
an IOC with no
recommendation to hun
is received from the CT
function.
Business Case
Development
The business case
development function
may periodically
provide IOCs and
complementary course
of action to the hunt
team. This may result i
new rule request
development effort.
This is based upon
recommendation and
approval by the IR team
where the business cas
(use case) developmen
function deems a hunt
may be appropriate.
The hunt team perform
further evaluation whe
an IOC hunt suggestion
is received.
Incident Response
The IR function may
direct an IOC hunt as
part of, or resulting
from, incident response
activities.
The hunt team initiate
a hunt anytime an IOC
or other intelligence
regarding threat
activities are received
from recognized
intelligence (CTI) or
support activity. The
hunt team will
initiate a hunt at the
direction of the IR
function.
The following
evaluation criteria are
used by the hunt team t
determine if a hunt
should be initiated, or i
further evaluation of a
hunt request is required
IOC Criteria
The IOC is
associated
Exposure with malicio
activity
exploiting
known
vulnerabiliti
that exist
within the
environment
The infectio
vector of the
associated
malicious
activity is
related and
relevant to th
regular
activities or
users (e.g.,
watering hol
attacks on a
popular publ
websites).
The IOC is
Impact associated
with high-
impact activ
that may cau
significant
compromise
information
systems (e.g
Advance
Persistent
Threats
(APT),
hacktivism,
remote acces
tools,
credential
harvesters,
etc.)
Details The IR team determines the search timeline for the hunt based
on the following criteria for each respective input source:
Cyber Threat Intelligence
Watchlist
The search timeline for an IOC originating from a threat
intelligence feed should align with the recommendation
issued by the IOC source. A default of a ninety (90) days
should be used if no recommended search timeline has been
suggested by the IOC source.
Incident Response
The search timeline for an IOC from the IR function should
be determined by the IR function and included with the hunt
request.
Details The hunt team analysts perform the hunt based on the
established search timelines and IOC type and follows the
analyst procedures.
The following guidance is used to perform the hunt for each
respective IOC type (all historical searches are to be limited to
the established search timelines). If an analyst directs access a
security device is not feasible, interrogation of SIEM or a
centralized log management system may be leveraged for
hunting purposes.
Hunt Guidance
IOC
Type
Email Perform a search using the email security
solution where the specific indicator (e.g.,
subject, sender, message body, etc.) matches the
IOC.
Completed hunt
Input
Details The hunt concludes with one of the following three outcomes:
Nothing Discovered
No indication of active compromise or behavior violating
acceptable use or organizational policies discovered.
Output Completed hunt.
Relevant
C Internal Consulted regarding referral process.
Function(s)
Relevant
I Internal Informed of the non-malicious finding.
Function(s)
Details All information regarding the hunt and the details of the non-
malicious finding is compiled by the hunt team analyst [CyA]
and referred to the relevant internal function(s) to include
senior leadership for escalation as a compliance issue.
C N/A N/A
Hunt Team
I Trigger Informed of the completed hunt and outcome.
Source(s)
Details The hunt team analyst updates the MHTDB with all
required information regarding the completed hunt and
outcome and notifies the trigger source(s) that the hunt has
been completed and provides the results.
The following flowchart shows the detailed flow of the base hunt
workflow.
Base Hunting - RACI Matrix
C N/A N/A
I N/A N/A
Details The base hunt schedule specifies the frequency that the base
hunt is to be performed. The next hunt run-date and time are
recorded in the MTHDB. Upcoming base hunts will be added to
the queue and assigned to an available hunt team member.
Details The hunt team analyst performs the hunt based on the hunt
activities and established search timelines as established in the
MTHDB.
Hunt completed
Input
Responsible for ensuring that any required
R Hunt Team referral occurs depending on the final hunt
Analyst outcome.
Accountable to ensure that any required referral
A Hunt Team occurs depending on the final hunt outcome.
RACI Lead
C N/A N/A
I N/A N/A
Details The hunt concludes with one of the following three outcomes:
Nothing Discovered
No indication of active compromise or behavior violating
acceptable use or organizational policies.
Incident
C Response Consulted regarding referral process.
Team
Incident
I Response Informed of malicious findings
Team
Details All information regarding the hunt and the details of the
malicious finding is compiled by the hunt team analyst and
provided to the affected IR function.
Relevant
C Internal Consulted regarding referred to process.
Function(s)
Relevant
I Internal Informed of the non-malicious finding.
Function(s)
Details All information regarding the hunt and the details of the non-
malicious finding is compiled by the hunt team analyst and
provided to the relevant internal function(s) for escalation as a
compliance issue.
Output Handoff to relevant internal function(s)
Completed hunt
Input
C N/A N/A
Weekly Metrics
Weekly metrics reporting for the Hunting program will occur in a
weekly status report. Weekly metrics include the outcomes of hunts
completed during the prior seven days. Metrics should include IOCs
identified and resolved during the prior week. It should also include final
analytic reports created and disseminated to both internal divisions and
external partners to include the federal government.
Monthly Metrics
Monthly metrics for the hunting program will be reported and delivered
during the first full week of each calendar month. The monthly metrics report
will provide metrics regarding hunting program functions, including:
Hunts conducted by attack lifecycle
Hunt outcomes
Hunts transferred to business case development
Hunts escalated to the Incident Response team
Annual Metrics
Annual metrics will provide a view of where the hunting program
has improved over the year and aligned with the companies or agencies
strategic goals. It should also present any issues faced by the hunt program
such as a lack of necessary tools or data sources to complete effective hunt
operations.
1. Designate
2. Acquire
3. Analyze
4. Reporting
The THP Methodology begins with defining the boundaries that need
to be identified as part of hunt activities. Designate identifies all IT hardware,
software, network assets, etc., that likely are directly affected by known or
suspected malicious activities. Without a clear understanding of boundaries,
analytic resources may be inadvertently diverted or distracted by not defining
the scope of the effort.
Acquire is identical to the collection phase of the Intelligence
Lifecycle. In this phase CTI analysts conduct technical scans of the targeted
IT environment to determine malicious activities. Varied scans are used to
detect unauthorized port access, identify types of injected malware, use IOC
databases to determine potential threats, etc. Acquire gathers all relevant data
and facts around an event or incident for the purposes of organizational
action and IR alerts to senior and government officials as required by policy
or law.
In the Analyze phase, Hunt team members, in close coordination with
CTI personnel, determine the who, what, where, etc., factors in order to
identify attribution of the attack and whether the attack rises to the level of a
reportable event or incident. Analyze is a continual process that develops
intelligence reports and offers predictive intelligence to the organization and
third-party cooperative businesses or agency members. Analyze provides
critical (immediate), short-term (within 24 hours), and long-term (typically
monthly) analytical reports to members of both the technical and non-
technical personnel of the organization; this phase is identical within the
Intelligence Lifecycle.
Finally, Reporting identifies impacts to the IT environment, and
supports resourcing identification and demands where senior leaders must
play a decisive role. Reporting also ensures the quality review of reporting
and ensures its timely dissemination throughout the organization. Senior
leaders are accountable to ensuring critical intelligence identification and
communications are timely to reduce especially malicious activities against
the company or agency’s infrastructure.
The following sections provide greater “tactical” clarity for members
of the Hunt Team, CTI Analysts, IR personnel, and Senior Leaders. This
more descriptive application of the Hunt teams’ efforts begins with
Designate.
1. Designate:
The focus of the Designate phase is to develop a hypothesis. Formulate
a Hypothesis or hypotheses, as appropriate. The hypothesis can be based on
several different inputs including:
Internal use business scenarios
Threat exposure checks (Base Hunts)[12]
Incident response activities
CTI
Metrics: The data fields that may provide value to technical and non-
technical leadership may include:
Case records
Dates opened
Expected start and end times
Metrics: The data fields for compiling suggested potential metrics include:
Initial analysis
Actual correlated target data
Infrastructure searched
High fidelity indicators
Summary of search result success and failures
Escalation to the IR function
3. Analyze
Once the search has completed, the analysts will begin the Analyze
phase. The basic analysis tasks consist of:
Blacklisting. The process used to identify: (i) software programs that are
not authorized to execute on an information system;
or (ii) prohibited websites.
Nonfederal Information System. An information system that does not meet the
criteria for a federal information system. nonfederal
organization.
Whitelisting. The process used to identify: (i) software programs that are
authorized to execute on an information system.
Appendix B – Continuous Monitoring’s Importance to
the THP
Balakrishnan, B. (2015, October 6). Insider Threat Mitigation Guidance . Retrieved from
SANS Institute Infosec Reading Room: https://www.sans.org/reading-
room/whitepapers/monitoring/insider-threat-mitigation-guidance-36307
Caralli, R. A. (2004, December). Managing Enterprise Security (CMU/SEI-2004-TN-046).
Retrieved from Software Engineering Institute:
http://www.sei.cmu.edu/reports/04tn046.pdf
Committee on National Security Systems. (2010, April 26). National Information
Assurance (IA) Glossary. Retrieved from National Counterintelligence & Security
Center: http://www.ncsc.gov/nittf/docs/CNSSI-
4009_National_Information_Assurance.pdf
Department of Defense. (2014, March 12). DOD Instructions 8510.01: Risk Management
Framework (RMF) for DoD Information Technology (IT). Retrieved from Defense
Technical Information Center (DTIC):
http://www.dtic.mil/whs/directives/corres/pdf/851001_2014.pdf
GSA. (2012, January 27). Continuous Monitoring Strategy & Guide, v1.1. Retrieved from
General Services Administration:
http://www.gsa.gov/graphics/staffoffices/Continuous_Monitoring_Strategy_Guide_072712.pdf
Joint Medical Logistics Functional Development Center. (2015). JMLFDC Continuous
Monitoring Strategy Plan and Procedure. Ft Detrick, MD.
Kavanagh, K. M., Nicolett, M., & Rochford, O. (2014, June 25). Magic Quadrant for
Security Information and Event Management. Retrieved from Gartner:
http://www.gartner.com/technology/reprints.do?id=1-
1W8AO4W&ct=140627&st=sb&mkt_tok=3RkMMJWWfF9wsRolsqrJcO%2FhmjTEU5z17u8lWa
Kolenko, M. M. (2016, February 18). SPECIAL-The Human Element of Cybersecurity.
Retrieved from Homeland Security Today.US:
http://www.hstoday.us/briefings/industry-news/single-article/special-the-human-
element-of-cybersecurity/54008efd46e93863f54db0f7352dde2c.html
Levinson, B. (2011, October). Federal Cybersecurity Best Practices Study: Information
Security Continuous Monitoring. Retrieved from Center for Regulatory
Effectiveness: http://www.thecre.com/fisma/wp-content/uploads/2011/10/Federal-
Cybersecurity-Best-Practice.ISCM_2.pdf
McAfee® Foundstone® Professional Services. (2013). McAfee. Retrieved from White
Paper: Creating and Maintaining a SOC:
http://www.mcafee.com/us/resources/white-papers/foundstone/wp-creating-
maintaining-soc.pdf
NIST. (2011-A, August). NIST SP 800-128: Guide for Security-Focused Configuration
Management of Information Systems. Retrieved from NIST Computer Security
Resource Center: http://csrc.nist.gov/publications/nistpubs/800-128/sp800-128.pdf
NIST. (2011-B, September). Special Publication 800-137: Information Security
Continuous Monitoring (ISCM) for Federal Information Systems and
Organizations. Retrieved from NIST Computer Security Resource Center:
http://csrc.nist.gov/publications/nistpubs/800-137/SP800-137-Final.pdf
NIST. (2012, January). NIST Interagency Report 7756: CAESARS Framework Extension:
An Enterprise Continuous Monitoring Technical Reference Model (Second Draft), .
Retrieved from NIST Computer Resource Security Center:
http://csrc.nist.gov/publications/drafts/nistir-7756/Draft-NISTIR-7756_second-
public-draft.pdf
NIST. (2013, April). NIST SP 800-53, Rev 4: Security and Privacy Controls for Federal
Information Systems . Retrieved from NIST:
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf
Ross, R., Katzke, S., & Toth, P. (2005, October 17). The New FISMA Standards and
Guidelines Changing the Dynamic of Information Security for the Federal
Government. Retrieved from Information Technology Promotion Agency of Japan:
https://www.ipa.go.jp/files/000015362.pdf
Sann, W. (2016, January 8). The Key Missing Piece of Your Cyber Strategy? Visibility.
Retrieved from Nextgov: http://www.nextgov.com/technology-news/tech-
insider/2016/01/key-missing-element-your-cyber-strategy-visibility/124974/
SANS Institute. (2016, March 6). Beyond Continuous Monitoring: Threat Modeling for
Real-time Response. Retrieved from SANS Institute: http://www.sans.org/reading-
room/whitepapers/analyst/continuous-monitoring-threat-modeling-real-time-
response-35185
Sternstein, A. (2015, January 6). OPM Hackers Skirted Cutting-Edge Intrusion Detection
System,
Official Says . Retrieved from Nextgov:
http://www.nextgov.com/cybersecurity/2015/06/opm-hackers-skirted-cutting-edge-
interior-intrusion-detection-official-says/114649/
Appendix C -- Can the Human “Poet” Bring Value to
Predictive Analysis?
From the time we are children through adulthood we are reminded that
that which cannot be measured cannot be properly managed. (This is the core
of why metrics must be a vital part of THP). The United States Congress, for
example, repeatedly calls for better measurements and metrics; however, they
do not appear to subsequently predict or at least foresee the next financial
crisis, political coup or cybersecurity attack with these numbers alone. It is
not just the absence of such data, but the lack of employment of the
qualitative strengths of the human element.
The predictive forecasting and modeling community recognize the
value that humans bring to the field of data analytics. As Hubbard and
Seiersen (2016) state: “…if the primary concern about using probabilistic
methods is the lack of data, then you also lack the data to use non-
quantitative methods” (p. 38). The “human element” is that derived and non-
quantitative component that is needed.
There are several reasons the often biased, irrational, and poetic human
will continue to contribute to the quality of the quantitative. This includes
the value of the individual subject matter expert, the collective synergy of a
larger sample of experts, and the innate innovativeness of man attempting to
solve problems and reject the status quo. Humans do not detract from the
calculations but provide their own unique recognition and context to both the
inputs and the results.
Hubbard & Seiersen (2016) and Tetlock & Gardner (2016) identify the
importance of the “calibrated” subject matter expert to improve the state of
predictive analysis. Such an individual is not only proficient in their field, but
also has been trained to understand a significant facet of quantitative
measurement: uncertainty. These individuals are described by Tetlock (2016)
as the “superforecasters.” Silver (2012) recognizes that forecasting is not
about absolute mathemetical precision, but the acknowledgement of the
importance of knowing that “[w]e must become more comfortable with
probability and [emphasis added] uncertainty” (p. 15); the individual
understands the role of uncertainty where the mathematical equation or model
does not. It is this uncertainty that helps others understand the expected
deviation by the superforecaster, specifically, as the norm and not the
exception to real accuracy.
It is also the collective nature of human beings attempting to solve
problems that continues to contribute to better predictive analytic outcomes.
In 1906, the British Scientist, Sir Francis Galton, conducted an experiment
where he had several hundred individuals attempt to determine the final
weight of a slaughtered cow. The result was greater accuracy from the
collective crowd. With remarkable precision, the average weight guessed by
the participants was 1197 pounds, and in fact, the actual weight was 1198
pounds (Tetlock & Gardner, 2016). It is this type of “crowd sourcing” effect
that demonstrates the informed and knowledgeable average of all guesses (or,
predictions) culminated into a final and near accurate answer. It is this
collective “hive mind” that shows how the accumulation of human
knowledge can be brought together to directly enhance the precision of the
result.
Additionally, Christakis and Fowler (2009) recognize that
individually humans are an important component of quantified and predictive
outcomes, but even greater outcomes are possible jointly. “…[C]hallenges
require us to recognize that although human beings are individually powerful,
we must act together to achieve what we could not accomplish on our own”
(p. 304). The more knowledgeable experts contributing to a predictive
analytical formula or algorithm will more likely contribute to greater
accuracy less any identified uncertainty.
In the book, Moneyball (Lewis, 2004), Billy Beane, the coach of the
Oakland A’s baseball team, successfully employed the rigors of data analysis
and statistics to propel his team to its historical twenty game winning streak
where it was one of the worst ranked teams at the time (Thum, 2012). The
challenges were many, but he knew that following the old models of human
instinct, hunches, and guess work in selecting the best players was not going
to solve his biggest problem—not having the larger payrolls that other big-
league teams had to recruit the “best” players (Lewis, 2004).
Beane also identified that baseball scouting “…was at roughly the
same stage of development in the twenty-first century as professional
medicine was in the eighteenth” (Lewis, 2004, p. 17). His recruiting of Paul
DePodesta, a Harvard graduate with a love of math, statistics, and baseball
was a recognition that there was a need for innovation; an innovation that
riled his own internal scouting staff (Lewis, 2004). It was his ultimate and
revolutionary acknowledgment of the mathematical approaches brought by
DePodesta that was so effective for the improvement of the Oakland A’s
successful winning on the playing field.
The human element in the form of the Cyber Analyst (CyA) will
always be a vital part of data analytical and predictive improvements. With
the exponential growth and access to data and the power of the fledgling data
science community, it will bring needed value to the development of such
analyses. Future predictive analytic progress will rely upon the unique
abilities man presents, and it will directly result in better forecasts. These
better forecasts will be a consequence of man’s ability to grow and improve
the very state of his own world around him.
References for “Can the Human Poet Bring Value to Predictive
Analysis?”
Christakis, N., & Fowler, J. (2009). Connected; The surprising power of our social
networks and how they shape our lives. New York: Little, Brown & Company.
Hubbard, D., & Seiersen, R. (2016). How to measure anything in cybersecurity risk.
Hoboken, NJ: John wiley & sons.
Lewis, M. (2004). Moneyball: The art of winning an unfair game. New York: WW Norton
& Company.
Silver, N. (2012). The signal and the noise: Why so many predictions fail--but some don't.
New York: Penguin.
Tetlock, P., & Gardner, D. (2016). Superforecasting: The art and science of prediction.
New York: Random House.
Thum, W. (2012, August 19). Ten years later: The A's 20-game winning streak, Scott
Hatteberg, and Moneyball. Retrieved from SBNATION.com:
https://www.sbnation.com/2012/8/19/3250200/ten-year-anniversary-athletics-20-
game-winning-streak-hatteberg-moneyball
About the Author
Mr. Russo is a former Senior Information Security Engineer within
the Department of Defense's (DOD) F-35 Joint Strike Fighter program. He
has an extensive background in cybersecurity and is an expert in the Risk
Management Framework (RMF) to include DOD Instruction (DODI)
8510.01 which implements RMF throughout the DOD and the federal
government. He holds both a Certified Information Systems Security
Professional (CISSP) certification and a CISSP in information security
architecture (ISSAP). He holds a 2017 certification as a Chief Information
Security Officer (CISO) from the National Defense University, Washington,
DC. He retired from the US Army Reserves in 2012 as the Senior Intelligence
Officer.
He is the former CISO at the Department of Education wherein 2016
he led the effort to close over 95% of the outstanding US Congressional and
Inspector General cybersecurity shortfall weaknesses spanning as far back as
five years.
Mr. Russo is the former Senior Cybersecurity Engineer supporting the
Joint Medical Logistics Development Functional Center of the Defense
Health Agency (DHA) at Fort Detrick, MD. He led a team of engineering
and cybersecurity professionals protecting five major Medical Logistics
systems supporting over 200 DOD Medical Treatment Facilities around the
globe.
In 2011, Mr. Russo was certified by the Office of Personnel
Management as a graduate of the Senior Executive Service Candidate
program.
From 2009 through 2011, Mr. Russo was the Chief Technology Officer
at the Small Business Administration (SBA). He led a team of over 100 IT
professionals in supporting an intercontinental Enterprise IT infrastructure
and security operations spanning 12-time zones; he deployed cutting-edge
technologies to enhance SBA’s business and information sharing operations
supporting the small business community. Mr. Russo was the first-ever
Program Executive Officer (PEO)/Senior Program Manager in the Office of
Intelligence & Analysis at Headquarters, Department of Homeland Security
(DHS), Washington, DC. Mr. Russo was responsible for the development and
deployment of secure Information and Intelligence support systems for OI&A
to include software applications and systems to enhance the DHS mission. He
was responsible for the program management development lifecycle during
his tenure at DHS.
He holds a Master of Science from the National Defense University in
Government Information Leadership with a concentration in Cybersecurity
and a Bachelor of Arts in Political Science with a minor in Russian Studies
from Lehigh University. He holds Level III Defense Acquisition certification
in Program Management, Information Technology, and Systems
Engineering. He has been a member of the DOD Acquisition Corps since
2001.
Copyright 2019, Syber-Risk.com, All Rights Reserved
Washington, DC ∞ Tucson, AZ
[1]
A Hack-back is not recommended. Actions, especially against nation-state hackers, may result in
far more damage by the hacker than initiating an attack against the threat target. The best course of
action is determining the attribution of the attackers and reporting as part of an established Incident
Response Plan (IRP) to authorities.
[2]
Other inputs may include information from public alert websites/feeds and the federal
government specific to their role or industry.
[3]
Hunt requests are typically triggered by outside detected events and base hunts are
used to assess organizational and individual compliance with Acceptable Use Policies
(AUP) covering organizational personnel.
[4]
Rule creation can be either applied in a manual manner by a CyA or more likely as a “rule”
implemented within automated security devices to include firewalls, Intrusion Prevention Systems
(IPS), or Security Information Event Management (SIEM) devices.
[5]
“Smart” network devices may include firewalls, Intrusion Detection/Prevention
Systems, or Security Incident Event Monitoring (SIEM) hardware.
[6]
APTs are typically nation-state cyber-activities supported by a nation. The top 3 major
countries are China, Russia, and Iran, that specifically target US federal agencies and
companies.
[7]
SHA-256 is the federally recommended hashing standard. Older versions, such as MD-
5 is highly-breakable and is no longer in use by most major corporations due to its current
vulnerabilities.
[8]
Data is the main item within any network that should be specifically protected
especially if is of a sensitive or restricted nature; modern-day cybersecurity protections are
focused on data protection.
[9]
Some businesses and agencies identify “best practice” violations as a compliance issue. It is not. Failures of best
practice may include, for example, weak passwords or leaving smart cards unattended. Such failures must be captured
and enforceable through acceptable use or like business policies are Human Resource sanctioned policies and laws for
the punishment of an individual.
[10]
A “hunt schedule” is usually an ad hoc inspection of the agency’s IT environment that
is coordinated between IR and Hunt personnel. It is typically restricted to personnel with a
need-to-only purpose.
[11]
This could include senior leadership, an individual’s direct supervisor, or Human
Resources (HR) to begin disciplinary actions and documentation requirements.
[12]
A base hunt, or threat exposure check, is defined as a repeatable search based on analytical
methodology which produces a low fidelity results (i.e., results that require analyst review and
cannot be fully automated as a rule); these hunts will reside in the MHTDB.
[13]
An outlier or “black swan” event in a low or unexpected occurrence based on past
historical data and intelligence. While these are uncommon, they may highlight new and
changing Tactics, Techniques and Procedures (TTP) by hackers.
[14]
Nation-states hackers may conduct low-level “probing” actions to identify weaknesses
in corporate perimeters and networks. They are intended to ascertain the level of defensive
complexity an environment may or may not have to future attack.