Threat Detection
Threat Detection
TTP analysis can help security teams detect and mitigate attacks by
understanding the way threat actors operate. Below we define the three
elements of TTPs: tactics, techniques, and procedures.
Tactics
In general, tactics are types of activity that cyber criminals use to carry out
an attack. For example, gaining unauthorized access to sensitive data,
performing lateral movement within a network, or compromising a website.
Techniques
Skills are general methods that attackers use to achieve their goals. For
example, if the goal is to compromise a website, the technique might be
SQL injection. Each tactic can comprise several techniques.
Procedures
A procedure is a specific series of steps that cyber criminals can use to carry
out an attack. To take the example of SQL injection, the procedure might
involve scanning the target website for vulnerabilities, writing a SQL query
that includes malicious code, and submitting it to an unsecured form on the
website to gain control of the server.
Known threats can sometimes slip past even the best defensive measures, which
is why most security organizations actively look for both known and unknown
threats in their environment. So how can an organization try to detect both
known and unknown threats?
There are several methods available in the defender's arsenal that can help:
Some targets are just too tempting for an attacker to pass up. Security teams
know this, so they set traps in hopes that an attacker will take the bait. Within the
context of an organization's network, an intruder trap could include a honeypot
target that may seem to house network services—especially appealing to an
attacker, or “honey credentials” that appear to have user privileges an attacker
would need in order to gain access to sensitive systems or data. When an
attacker goes after this bait, it triggers an alert so the security team know there
is suspicious activity in the network that should be investigated. Learn more
about the different types of deception technology .
But threat detection technology also plays a key part in the detection process.
There's no magic bullet in threat detection—no single tool that will do the job.
Instead, a combination of tools acts as a net across the entirely of an
organization's network, from end to end, to try and capture threats before they
become a serious problem.
Security event threat detection technology to aggregate data from events across the
network, including authentication, network access, and logs from critical systems.
Network threat detection technology to understand traffic patterns on the network
and monitor traffic within and between trusted networks, as well as to the internet.
Endpoint threat detection technology to provide detailed information about possibly
malicious events on user machines, as well as any behavioral or forensic information
to aid in investigating threats.
6 Essential
business as secure as possible.
The advent of cloud, multi-cloud, and hybrid cloud architectures has made
it possible for businesses to rapidly adapt to changing workforces and
working styles. However, these changes have also introduced new
challenges in managing security operations.
As the remote workforce grows and cyber threats stack up, its important
organizations have the capability to manage risks and uncertainty to keep
critical assets secure. Where risks are known, actions are clear. But with
unknown risks, there needs to be a focus on disciplined research and
investigation. This helps generate intelligence to develop detailed use
cases, providing Security Operations (SecOps) teams with a guide to
respond to threats.
Identify
Establishing a clear methodology for security operations teams to follow is
a critical element of effective and efficient threat detection and response.
This methodology starts with identifying uses cases. Uses cases are the
definition and analysis of an attack method. In addition to the type of
attack, use cases include step-by-step detail on how an attack unfolds, e.g.
exfiltration of data from an organization or compromised privileged login, as
well as possible control points for use in mitigation. Establishing a
methodology that SecOps then leverages to identify and create new use
cases is crucial to ensuring the organization maintains a strong security
posture.
Without these insights you will lack the visibility needed to truly maximize
the value of follow on process steps such as developing, evaluating, and
enhancing.
Prioritize
Establishing a model to prioritize use cases will help you manage this
balance. One approach is to create relative categories. For example:
Develop
As we discovered previously, establishing and documenting a procedure
for identifying and prioritizing threat scenarios allows you to maintain rigor
and discipline throughout the security operations lifecycle.
Step 1: Review and refine the description of the threat and the
requirements for addressing it
Step 2: Ensure monitoring tool deployment and configuration
Step 3: Validate data sources
Step 4: Validate context sources
Step 5: Perform a gap analysis against security operations
procedures
Evaluate
Once a use case is developed, you’ll need to determine what will trigger a
review or reevaluation of its function. This will help avoid the “set it and
forget it” approach that often leads to security operations teams losing sight
of the need for this critical part of the lifecycle.
Deploy
The deployment phase involves the following practical tasks:
Training security operations teams to respond to new alerts
with clear actions
Updating and publishing runbooks, ops guides, and process
documents
Promoting code through testing, staging, and production
environments
Reporting threat validation metrics
Enhance
Unlike the evaluation phase, fine-tuning a use case is not driven by network
or business changes. Rather, it is driven by the evolution of threat tactics,
techniques, and procedures, as well as changes in data and context. The
purpose of this phase is to provide clear actions and remove any
uncertainty.
Like other phases in this lifecycle, a defined process will allow teams to
successfully address the rapidly expanding threat landscape.
Learn how Cisco MDR can enhance your security operations and give you
the freedom to focus on what matters most. Get in touch today.