Expect More From Your Intelligence — Starting With Context

Expect More From Your Intelligence — Starting With Context

Picture this:

Think of all the headaches you’d spare your security team. Unfortunately, this dream is still in the works, but intelligence gets you closer to this vision.

Security teams invest heavily in software to defend their network against indicators of compromise (IOCs) like phishing, malware, and other cyber threats. While practical and essential, these tools still refer some traffic (and now ever more traffic in this era of work from home and remote work) to Security Operations (SecOps) teams for decisions. Those teams qualify their choices based on threat data. Ideally, such decisions should be based on and validated by intelligence.

To us, intelligence is the collection and contextualization of data points across the entirety of the internet – a tightly woven thread of insights that are purpose-built for detecting, investigating, and monitoring cyber and physical threats.

This blog post examines the intelligence analysts and leadership needs to determine how to prioritize their threats – that intelligence starts with context.

A day in the life of a security operations analyst

In a typical threat investigation, security analysts, or incident response teams, receive an alert from their security information and event management (SIEM) product, which continually pulls data on security events from the internal network and concentrates that data for analysis. Analysts then have to decide whether the event is a threat or not, so they begin collecting information on the internet and through their existing security tools.

The problem is that their efforts involve time-consuming manual research that often compares detections against a flat risk list and gets some details on IOCs – which, at that time, may already be stale or irrelevant.

Next, security analysts attempt to cobble together the data needed to understand the nature of the threat. Here’s an example:

The team spends ten, then 20, then 30 minutes of valuable time on manual research – still without establishing a foundational picture of the threat or whether/how to address it. Even if they find a clue in one source, their next step is to continue searching to confirm the hunch; meanwhile, the threat persists unmitigated.

In this all-too-common situation, analysts burn precious time looking for context from disparate sources on the open and dark web, yet only come up with a few pieces of what they need to reach a good understanding of the threat.

In other words, analysts are trying to conduct a threat investigation without much intelligence – the lack of context results in missed threats and slow responses.

Provide sufficient context for threat intelligence

Empowering security analysts to conduct threat investigations with intelligence requires that the intelligence:

Intelligence with full context allows analysts to derive more value from the data and logs they already have. They can detect relevant threats to your organization. They can use the context to automate more of the decision-making of security operations teams. And they can gradually move from investigating current threats to uncovering and tracking relevant threat actors targeting their organization through threat prioritization, threat monitoring, and threat hunting.

So, how can your organization get there?

Put intelligence into action: monitoring-integration-analysis

As you continue on your intelligence-led security journey, we recommend that your organization consider how intelligence fits into three different areas:

Coming Soon: Put Intelligence Into Action: Anatomy of a Threat Hunt

The next post in this series includes a walkthrough of this monitoring-integration-analysis model. You’ll follow the workflow of a threat hunt using threat intelligence, Splunk SOAR and Splunk Enterprise Security – and you’ll see how context makes a difference at each stage.