Top Banner
UNCLASSIFIED A Common Cyber Threat Framework A Foundation for Communication This is a work of the U.S. Government and is not subject to copyright protection in the United States.
23

A Common Cyber Threat Framework - dni.gov ·  · 2017-05-02A Common Cyber Threat Framework ... support analysis 3/13/2017 3. UNCLASSIFIED Cyber Threat Framework ... Layer 3 Layer

May 06, 2018

Download

Documents

hoangphuc
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: A Common Cyber Threat Framework - dni.gov ·  · 2017-05-02A Common Cyber Threat Framework ... support analysis 3/13/2017 3. UNCLASSIFIED Cyber Threat Framework ... Layer 3 Layer

UNCLASSIFIED

A Common Cyber Threat FrameworkA Foundation for Communication

This is a work of the U.S. Government and is not subject to copyright protection in the United States.

Page 2: A Common Cyber Threat Framework - dni.gov ·  · 2017-05-02A Common Cyber Threat Framework ... support analysis 3/13/2017 3. UNCLASSIFIED Cyber Threat Framework ... Layer 3 Layer

We both speak English?

• Apartment

• French Fries

• Elevator

• Gasoline

• Bin

• Active

• Flat

• Chips

• Lift

• Petrol

• Bin

• Active

23/13/2017

UNCLASSIFIED

Page 3: A Common Cyber Threat Framework - dni.gov ·  · 2017-05-02A Common Cyber Threat Framework ... support analysis 3/13/2017 3. UNCLASSIFIED Cyber Threat Framework ... Layer 3 Layer

UNCLASSIFIED

What You Need to Know

• Define Cyber Threat Framework

• Recognize the benefits of using standardized language to describe cyber activity and enable consistent categorization

• Understand the Cyber Threat Framework hierarchy and its four layers of information

• Understand how the Cyber Threat Framework can be used to support analysis

33/13/2017

Page 4: A Common Cyber Threat Framework - dni.gov ·  · 2017-05-02A Common Cyber Threat Framework ... support analysis 3/13/2017 3. UNCLASSIFIED Cyber Threat Framework ... Layer 3 Layer

UNCLASSIFIED

Cyber Threat Framework (CTF) Overview

The Cyber Threat Framework was developed by the US Government to enable consistent characterization and categorization of cyber threat events, and to identify trends or changes in the activities of cyber adversaries. The framework captures the adversary life cycle from (a) “PREPARATION” of capabilities and targeting to (b) initial “ENGAGEMENT” with the targets or temporary nonintrusive disruptions by the adversary to (c) establishing and expanding the “PRESENCE” on target networks, to (d) the creation of “EFFECTS and CONSEQUENCES” from theft, manipulation, or disruption. The framework categorizes the activity in increasing “layers” of detail (1- 4) as available in the intelligence reporting.

43/13/2017

Page 5: A Common Cyber Threat Framework - dni.gov ·  · 2017-05-02A Common Cyber Threat Framework ... support analysis 3/13/2017 3. UNCLASSIFIED Cyber Threat Framework ... Layer 3 Layer

UNCLASSIFIED

There are many cyber threat models or frameworks – why build another?

• Began as a construct to enhance data-sharing throughout the US Government

• Facilitates efficient situational analysis based on objective (typically, sensor-derived) data

• Provides a simple, yet flexible, collaborative way of characterizing and categorizing activity that supports analysis, senior-level decision making, and cybersecurity

• Offers a common backbone (‘cyber Esperanto’); easier to map unique models to a common standard than to each other

• Facilitates cyber threat trend and gap analysis, and assessment of collection posture

53/13/2017

Page 6: A Common Cyber Threat Framework - dni.gov ·  · 2017-05-02A Common Cyber Threat Framework ... support analysis 3/13/2017 3. UNCLASSIFIED Cyber Threat Framework ... Layer 3 Layer

UNCLASSIFIED

Merging Disparate Data Layers into a Common Framework is a Standard Practice

• Weather – overlaying satellite (clouds), doppler (rain), and thermometer (temperature) data atop a map yields a forecast: “take your umbrella and wear a light coat”

• Air Traffic Control – integrating weather, regional/ground control radars, scheduling data, aircraft/ground handler status to control air traffic: “you are cleared to land”

• In a similar fashion, a cyber threat framework based on measurable data facilitates visualization, analysis, and realization of a Common Operating Picture of threat activity

• It can also be matched with other data layers (e.g., vulnerability, shared connections) to become more actionable

63/13/2017

Page 7: A Common Cyber Threat Framework - dni.gov ·  · 2017-05-02A Common Cyber Threat Framework ... support analysis 3/13/2017 3. UNCLASSIFIED Cyber Threat Framework ... Layer 3 Layer

UNCLASSIFIED

Cyber Threat Framework Evolution

1) Created consensus around a foundation

2) Added context to validate linkages and demonstrate that you could move up and down the framework

3) Developed presentation models

4) Current focus – encompass analytics and automation

Preparation Engagement Presence Effect/Consequence

3) Presentation

2) Context

1) Foundation

4) Analysis

73/13/2017

Page 8: A Common Cyber Threat Framework - dni.gov ·  · 2017-05-02A Common Cyber Threat Framework ... support analysis 3/13/2017 3. UNCLASSIFIED Cyber Threat Framework ... Layer 3 Layer

UNCLASSIFIED

Resource

development

Maintain/expand

Target access

Deny AccessIntent ExploitationReconnaissance

Staging Delivery

Target ID Detection

avoidance

Establish/modify

Network infrastructureC2

Extract Data

Manipulate

Reconnaissance Installation Actions on ObjectiveDelivery C2Weaponization Exploitation

Intent Staging EffectEngagement ManeuverDevelopment Reconnaissance Configure C2

Reconnaissance Exploitation EffectIntent Development Delivery ManeuverStaging C2Configure

Preparation Engagement Presence Effect/Consequence

Prepare Propagate EffectAdminister Engage

Compromise EffectsAdministration Targeting Propagation

ErrorEnvironmental threat MisuseHacking SocialMalware Physical threat

Situational

awareness

Foot printing Enumeration Privilege

escalation

Scanning Covering

tracks

Gain access

(exploitation)

Creating

Backdoors

83/13/2017

Deriving a ‘Best of Breed’ Common Framework

STIXTM

NSA 10 Step

Lockheed MartinKill Chain ®

ALA

CNE

NSA

VERIS Categories of Threat Actions

JCAC Exploitation

Page 9: A Common Cyber Threat Framework - dni.gov ·  · 2017-05-02A Common Cyber Threat Framework ... support analysis 3/13/2017 3. UNCLASSIFIED Cyber Threat Framework ... Layer 3 Layer

UNCLASSIFIED

Cyber Threat Framework Layer 1

Preparation Engagement Presence Effect/Consequence

Layer 2

Layer 1

External actions Internal actions

“Left of Intrusion” “Right of Intrusion”

StagesThe progression of cyber

threat actions over time

to achieve objectives

Pre-execution actions Operational actions

• Threat activity based on measurable/observable actions• Every victim and all reported activity accounted for• Layered data hierarchy providing activity traceability

93/13/2017

Page 10: A Common Cyber Threat Framework - dni.gov ·  · 2017-05-02A Common Cyber Threat Framework ... support analysis 3/13/2017 3. UNCLASSIFIED Cyber Threat Framework ... Layer 3 Layer

CTF Layer 1 Definition – Preparation

Preparation

• Activities undertaken by a threat actor, their leadership and/or sponsor to prepare for conducting malicious cyber activities, e.g., establish governance and articulating intent, objectives, and strategy; identify potential victims and attack vectors; securing resources and develop capabilities; assess intended victim's cyber environment; and define measures for evaluating the success or failure of threat activities.

103/13/2017

UNCLASSIFIED

Page 11: A Common Cyber Threat Framework - dni.gov ·  · 2017-05-02A Common Cyber Threat Framework ... support analysis 3/13/2017 3. UNCLASSIFIED Cyber Threat Framework ... Layer 3 Layer

CTF Layer 1 Definition – Engagement

Engagement

• Threat actor activities taken prior to gaining but with the intent to gain unauthorized access to the intended victim's physical or virtual computer or information system(s), network(s), and/or data stores.

113/13/2017

UNCLASSIFIED

Page 12: A Common Cyber Threat Framework - dni.gov ·  · 2017-05-02A Common Cyber Threat Framework ... support analysis 3/13/2017 3. UNCLASSIFIED Cyber Threat Framework ... Layer 3 Layer

CTF Layer 1 Definition – Presence

Presence

• Actions taken by the threat actor once unauthorized access to victim(s)' physical or virtual computer or information system has been achieved that establishes and maintains conditions or allows the threat actor to perform intended actions or operate at will against the host physical or virtual computer or information system, network and/or data stores.

123/13/2017

UNCLASSIFIED

Page 13: A Common Cyber Threat Framework - dni.gov ·  · 2017-05-02A Common Cyber Threat Framework ... support analysis 3/13/2017 3. UNCLASSIFIED Cyber Threat Framework ... Layer 3 Layer

CTF Layer 1 Definition – Effect/Consequence

Effect/Consequence

• Outcomes of threat actor actions on a victim's physical or virtual computer or information system(s), network(s), and/or data stores.

133/13/2017

UNCLASSIFIED

Page 14: A Common Cyber Threat Framework - dni.gov ·  · 2017-05-02A Common Cyber Threat Framework ... support analysis 3/13/2017 3. UNCLASSIFIED Cyber Threat Framework ... Layer 3 Layer

UNCLASSIFIED

Cyber Threat Framework (v4) Layer 2 Details

143/13/2017

The purpose of

conducting an action

or a series of actions

The progression of cyber

threat actions over time

to achieve objectives

Actions and associated

resources used by an

threat actor to satisfy

an objective

Plan activity

Complete

preparations

Acquire victim

specific knowledge

Conduct research &

analysis

Develop resources &

capabilities

Deliver malicious

capability

Deploy capability

Exploit

vulnerabilities

Establish controlled

access

Establish persistence

Expand presence

Hide

Enable other operations

Extract data

Alter data and/or

computer, network or

system behavior

Deny access

Preparation Engagement Presence Effect/Consequence

External actions Internal actions“Left of Intrusion” “Right of Intrusion”

Stages

Interact with

intended victim

Destroy HW/SW/data

Refine focus of

activity

Pre-execution actions Operational actions

Objectives

Actions

Layer 2

Layer 1

Layer 3

Layer 4

Discrete cyber

threat intelligence

dataIndicators

Page 15: A Common Cyber Threat Framework - dni.gov ·  · 2017-05-02A Common Cyber Threat Framework ... support analysis 3/13/2017 3. UNCLASSIFIED Cyber Threat Framework ... Layer 3 Layer

UNCLASSIFIED

Cyber Threat Framework (v4) Layer 3 Exemplars

153/13/2017

The purpose of

conducting an action

or a series of actions

The progression of cyber

threat actions over time

to achieve objectives

Actions and associated

resources used by an

threat actor to satisfy

an objective

Plan activity

Complete

preparations

Acquire victim

specific knowledge

Conduct research &

analysis

Develop resources &

capabilities

Deliver malicious

capability

Deploy capability

Exploit

vulnerabilities

Establish controlled

access

Establish persistence

Expand presence

Hide

Enable other operations

Extract data

Alter data and/or

computer, network or

system behavior

Deny access

Preparation Engagement Presence Effect/ConsequenceStages

Interact with

intended victim

Destroy HW/SW/data

Refine focus of

activity

Pre-execution actions Operational actions

Objectives

Actions

Layer 2

Layer 1

Layer 3

• Dedicate

resources

• Create capabilities

• Establish

partnerships

• Persuade people

to act on the

threat actors

behalf (e.g.,

conduct social

engineering)

• Obtain a

legitimate user

account

• Increase user

privileges

• Move laterally

• Establish command

and control node

• Establish hop point

• Add victim system

capabilities to botnet

• Exfiltrate passwords,

credentials

Page 16: A Common Cyber Threat Framework - dni.gov ·  · 2017-05-02A Common Cyber Threat Framework ... support analysis 3/13/2017 3. UNCLASSIFIED Cyber Threat Framework ... Layer 3 Layer

UNCLASSIFIED

Cyber Threat Framework (v4) Layer 4 Exemplar

163/13/2017

The purpose of

conducting an action

or a series of actions

The progression of cyber

threat actions over time

to achieve objectives

Actions and associated

resources used by an

threat actor to satisfy

an objective

Plan activity

Complete

preparations

Acquire victim

specific knowledge

Conduct research &

analysis

Develop resources &

capabilities

Deliver malicious

capability

Deploy capability

Exploit

vulnerabilities

Establish controlled

access

Establish persistence

Expand presence

Hide

Enable other operations

Extract data

Alter data and/or

computer, network or

system behavior

Deny access

Preparation Engagement Presence Effect/Consequence

External actions Internal actions“Left of Intrusion” “Right of Intrusion”

Stages

Interact with

intended victim

Destroy HW/SW/data

Refine focus of

activity

Pre-execution actions Operational actions

Objectives

Actions

Layer 2

Layer 1

Layer 3

Layer 4

Discrete cyber

threat intelligence

dataIndicators

• Dedicate

resources

• Create capabilities

• Establish

partnerships

Company XXX

reported to have

created Malware QQ

These are representative Actions that can contribute to achieving the Layer 2 Objectives.

This is a simple example of the multitude of potential Indicators of threat actor Actions.

Page 17: A Common Cyber Threat Framework - dni.gov ·  · 2017-05-02A Common Cyber Threat Framework ... support analysis 3/13/2017 3. UNCLASSIFIED Cyber Threat Framework ... Layer 3 Layer

UNCLASSIFIED

Consumer Needs Dictate Perspective and Content• The foundation, based on empirical data, is the common

reference point for all subsequent views

– The consumer provides the focus by defining the view and/or adjusting the type of content (actor, activity, targeted sector, and victim)

– The consumer defines the required granularity in each view but can “drill down” to see the underlying detail as desired

• The framework is applicable to a range of threat actors, activity, targeted sectors, and victims

173/13/2017

Page 18: A Common Cyber Threat Framework - dni.gov ·  · 2017-05-02A Common Cyber Threat Framework ... support analysis 3/13/2017 3. UNCLASSIFIED Cyber Threat Framework ... Layer 3 Layer

UNCLASSIFIED

Analysis• Depending on the information selected and its presentation,

one can begin to conduct a variety of analysis:– Trends – change over time

• What caused the change

– Predictive – what’s next

– Environmental

• Was the threat different than expected

• What vulnerabilities were missed

• How to optimize remedial action

– Vulnerability – risk analysis

– Defensive posture

183/13/2017

Page 19: A Common Cyber Threat Framework - dni.gov ·  · 2017-05-02A Common Cyber Threat Framework ... support analysis 3/13/2017 3. UNCLASSIFIED Cyber Threat Framework ... Layer 3 Layer

UNCLASSIFIED

Preparation Engagement Presence Effect/ConsequenceThreat Actor

Threat actor

0 1 2 3 4 5 6 7 8 9

Preparation0 2 4 6 8 10

Engagement0 2 4 6 8 10

Presence0 1 2 3 4 5 6

Effect/Consequence

Threat Actor A

Threat Actor B

Threat Actor C

Threat Actor D

Threat Actor E

Threat Actor F

Threat Actor G

Threat Actor H

Cyber Threat Activity – CTF Layer 1 Stages Exemplar

Reporting Period: January – March 2016

193/13/2017

Page 20: A Common Cyber Threat Framework - dni.gov ·  · 2017-05-02A Common Cyber Threat Framework ... support analysis 3/13/2017 3. UNCLASSIFIED Cyber Threat Framework ... Layer 3 Layer

UNCLASSIFIED

Layer 2 Incidents

Chemical, Pharmaceutical Commercial Facilities Communications, Media

Critical Manufacturing Dams Defense Industy

Emergency Services Energy Finance, Investment, Trade

Food, Agriculture Government Facilities Healthcare, Public Health

Information Technology Nuclear Reactors, Material, Waste Other Domestic

Other Government (include DoD) Transportation Systems Water & Wastewater

CTF Layer 2 Exemplar Threat Events by Sector

203/13/2017

Chemical, Pharmaceutical 7

Commercial Facilities 1

Communications, Media 15

Critical Manufacturing 2

Dams 1

Defense Industy 20

Emergency Services 1

Energy 5

Finance, Investment,

Trade 10

Food, Agriculture 2

Government Facilities 1

Healthcare, Public Health 3

Information Technology 15

Nuclear Reactors,

Material, Waste 1

Other Domestic 2

Other Government

(include DoD) 10

Transportation Systems 2

Water & Wastewater 1

Defense Industry

Communications, Media

Finance

Other Govt(Includes DoD)

Information Technology

Page 21: A Common Cyber Threat Framework - dni.gov ·  · 2017-05-02A Common Cyber Threat Framework ... support analysis 3/13/2017 3. UNCLASSIFIED Cyber Threat Framework ... Layer 3 Layer

UNCLASSIFIED

CTF (v4) Layer 2 Objectives Exemplar

Threat actor

Plan activity

Conduct research & analysis

Develop resources & capabilities

Acquire victim specific knowledge

Complete preparations

Develop capability

Interact with intended victim

Exploit vulnerabilities

Deliver malicious capability

Establish controlled access

Hide

Expand presence

Refine focus of activity

Establish persistence

Destroy HW/SW/data

Extract data

Alter data and/or computer, network or system behavior

Deny Access

Enable other operations

213/13/2017

Threat Actor A

Threat Actor B

Threat Actor C

Threat Actor D

Threat Actor E

Threat Actor F

Threat Actor G

Threat Actor H

Pre

par

atio

nEn

gage

me

nt

Pre

sen

ceEf

fect

/Co

nse

qu

en

ce

Layer 1Stages

Layer 2Objectives

Page 22: A Common Cyber Threat Framework - dni.gov ·  · 2017-05-02A Common Cyber Threat Framework ... support analysis 3/13/2017 3. UNCLASSIFIED Cyber Threat Framework ... Layer 3 Layer

UNCLASSIFIED

Summary

• The Cyber Threat Framework supports the characterization and categorization of cyber threat information through the use of standardized language.

• The Cyber Threat Framework categorizes the activity in increasing “layers” of detail (1- 4) as available in the intelligence reporting.

• The Cyber Threat Framework can be used to support analysis

223/13/2017

Page 23: A Common Cyber Threat Framework - dni.gov ·  · 2017-05-02A Common Cyber Threat Framework ... support analysis 3/13/2017 3. UNCLASSIFIED Cyber Threat Framework ... Layer 3 Layer

UNCLASSIFIED

Questions?

233/13/2017