Blog

What is Threat Intelligence?

Steve Miller
December 7, 2017
Table of contents
<p><em>This is the first blog in a series titled, "What is Threat Intelligence?". Continue with the series at the bottom of this page. </em></p> <h3><em>Written by Steve Miller and Payton Bush</em></h3> <p>Threat intelligence is a subset of intelligence focused on information security. Gartner (sorry, people) defines threat intelligence as “evidence-based knowledge...about an existing or emerging menace or hazard...to inform decisions regarding the subject’s response to that menace or hazard.” In short, threat intelligence is curated information intended to inform you and help you make better decisions about how to stop bad things from happening to you.</p> <p>There are a few schools of thought and several sets of vernacular used to describe cyber threat intelligence. But there are generally three “levels” of cyber threat intelligence: strategic, operational and tactical. Some of the similarities and differences between these kinds of intelligence are summarized below:</p> <p>Collecting each flavor of intelligence is important because they serve different functions.</p> <table class="table table-bordered table-striped"> <tbody> <tr> <td style="text-align: center;"><strong>Type</strong></td> <td style="text-align: center;"><strong>Tagline</strong></td> <td style="text-align: center;"><strong>Half life of utility (for good guys and bad guys)</strong></td> <td style="text-align: center;"><strong>Focus</strong></td> <td style="text-align: center;"><strong>Built on the analysis of</strong></td> <td style="text-align: center;"><strong>Output data types</strong></td> </tr> <tr> <td style="text-align: center;">Strategic</td> <td> <p style="text-align: center;">Who?</p> <p style="text-align: center;">Why?</p> </td> <td style="text-align: center;">Long (multiyear)</td> <td style="text-align: center;">Non-technical</td> <td style="text-align: center;">Big campaigns, groups, multi victim intrusions (and operational intel)</td> <td style="text-align: center;">Long form writing about: victimology, YoY methodology, mapping intrusions and campaigns to conflicts, events and geopolitical pressures</td> </tr> <tr> <td style="text-align: center;">Operational</td> <td> <p style="text-align: center;">How?</p> <p style="text-align: center;">Where?</p> </td> <td style="text-align: center;">Medium (one year plus)</td> <td style="text-align: center;">Mixed (both really)</td> <td style="text-align: center;">Whole malware families, threat groups, human behavior analysis (and tactical intel)</td> <td style="text-align: center;">Short form writing, bulleted lists, about: persistence and comms techniques, victims, group profiles, family profiles, TTP descriptions, triggers, patterns, and methodology rules</td> </tr> <tr> <td style="text-align: center;">Tactical</td> <td style="text-align: center;">What?</td> <td style="text-align: center;">Short (months)</td> <td style="text-align: center;">Technical</td> <td style="text-align: center;">Security events, individual malware samples, phishing emails, attacker infrastructure</td> <td style="text-align: center;">Atomic and machine-readable indicators such as IPs, domains, IOCs, “signatures”</td> </tr> </tbody> </table> <p>Analysts deal with a lot of alerts. Alerts enriched with tactical intelligence provide more context and help analysts determine which threats are worth worrying about and which can safely be ignored. These atomic indicators are often changed quickly though, making it important to also incorporate operational and strategic intelligence into decisions.</p> <p>Operational intelligence helps fuel meaningful detection, incident response and hunting programs. For example, it can help identify patterns in attacks with which we can create logical rules in tech systems that will detect malicious activity specific indicators.</p> <p>Strategic intelligence can help with assessing and mitigating current and future risks to organizations. For example, a corporation releasing a new product or completing a merger will want to understand not only the potential impact but also the associated risks. This intelligence is particularly useful for people in leadership roles such as CISOs and executive leadership who must justify budgets and make better informed investment decisions.</p> <p>The sum of these different kinds of threat intelligence is the ability to make informed decisions on how to proactively and reactively respond to threats. This includes what solutions to use, how they should be leveraged, and even just who to keep tabs on.</p> <p>Check out the other blogs in our series for a deeper look into what these three kinds of intelligence look like and how they’re used.<br/> <br/> <a href="https://www.anomali.com/blog/what-is-strategic-threat-intelligence">What is Strategic Threat Intelligence?</a><br/> <a href="https://www.anomali.com/blog/what-is-operational-threat-intelligence">What is Operational Threat Intelligence?</a><br/> <a href="https://www.anomali.com/blog/what-is-tactical-threat-intelligence">What is Tactical Threat Intelligence?</a> </p>
Steve Miller

Steve Miller is a former Threat Analyst at Anomali.

Discover More About Anomali

Get the latest news about Anomali's Security and IT Operations platform,

SEe all Resources
No items found.
No items found.

Propel your mission with amplified visibility, analytics, and AI.

Learn how Anomali can help you cost-effectively improve your security posture.

December 7, 2017
-
Steve Miller
,

What is Threat Intelligence?

<p><em>This is the first blog in a series titled, "What is Threat Intelligence?". Continue with the series at the bottom of this page. </em></p> <h3><em>Written by Steve Miller and Payton Bush</em></h3> <p>Threat intelligence is a subset of intelligence focused on information security. Gartner (sorry, people) defines threat intelligence as “evidence-based knowledge...about an existing or emerging menace or hazard...to inform decisions regarding the subject’s response to that menace or hazard.” In short, threat intelligence is curated information intended to inform you and help you make better decisions about how to stop bad things from happening to you.</p> <p>There are a few schools of thought and several sets of vernacular used to describe cyber threat intelligence. But there are generally three “levels” of cyber threat intelligence: strategic, operational and tactical. Some of the similarities and differences between these kinds of intelligence are summarized below:</p> <p>Collecting each flavor of intelligence is important because they serve different functions.</p> <table class="table table-bordered table-striped"> <tbody> <tr> <td style="text-align: center;"><strong>Type</strong></td> <td style="text-align: center;"><strong>Tagline</strong></td> <td style="text-align: center;"><strong>Half life of utility (for good guys and bad guys)</strong></td> <td style="text-align: center;"><strong>Focus</strong></td> <td style="text-align: center;"><strong>Built on the analysis of</strong></td> <td style="text-align: center;"><strong>Output data types</strong></td> </tr> <tr> <td style="text-align: center;">Strategic</td> <td> <p style="text-align: center;">Who?</p> <p style="text-align: center;">Why?</p> </td> <td style="text-align: center;">Long (multiyear)</td> <td style="text-align: center;">Non-technical</td> <td style="text-align: center;">Big campaigns, groups, multi victim intrusions (and operational intel)</td> <td style="text-align: center;">Long form writing about: victimology, YoY methodology, mapping intrusions and campaigns to conflicts, events and geopolitical pressures</td> </tr> <tr> <td style="text-align: center;">Operational</td> <td> <p style="text-align: center;">How?</p> <p style="text-align: center;">Where?</p> </td> <td style="text-align: center;">Medium (one year plus)</td> <td style="text-align: center;">Mixed (both really)</td> <td style="text-align: center;">Whole malware families, threat groups, human behavior analysis (and tactical intel)</td> <td style="text-align: center;">Short form writing, bulleted lists, about: persistence and comms techniques, victims, group profiles, family profiles, TTP descriptions, triggers, patterns, and methodology rules</td> </tr> <tr> <td style="text-align: center;">Tactical</td> <td style="text-align: center;">What?</td> <td style="text-align: center;">Short (months)</td> <td style="text-align: center;">Technical</td> <td style="text-align: center;">Security events, individual malware samples, phishing emails, attacker infrastructure</td> <td style="text-align: center;">Atomic and machine-readable indicators such as IPs, domains, IOCs, “signatures”</td> </tr> </tbody> </table> <p>Analysts deal with a lot of alerts. Alerts enriched with tactical intelligence provide more context and help analysts determine which threats are worth worrying about and which can safely be ignored. These atomic indicators are often changed quickly though, making it important to also incorporate operational and strategic intelligence into decisions.</p> <p>Operational intelligence helps fuel meaningful detection, incident response and hunting programs. For example, it can help identify patterns in attacks with which we can create logical rules in tech systems that will detect malicious activity specific indicators.</p> <p>Strategic intelligence can help with assessing and mitigating current and future risks to organizations. For example, a corporation releasing a new product or completing a merger will want to understand not only the potential impact but also the associated risks. This intelligence is particularly useful for people in leadership roles such as CISOs and executive leadership who must justify budgets and make better informed investment decisions.</p> <p>The sum of these different kinds of threat intelligence is the ability to make informed decisions on how to proactively and reactively respond to threats. This includes what solutions to use, how they should be leveraged, and even just who to keep tabs on.</p> <p>Check out the other blogs in our series for a deeper look into what these three kinds of intelligence look like and how they’re used.<br/> <br/> <a href="https://www.anomali.com/blog/what-is-strategic-threat-intelligence">What is Strategic Threat Intelligence?</a><br/> <a href="https://www.anomali.com/blog/what-is-operational-threat-intelligence">What is Operational Threat Intelligence?</a><br/> <a href="https://www.anomali.com/blog/what-is-tactical-threat-intelligence">What is Tactical Threat Intelligence?</a> </p>

Get the Latest Anomali Updates and Cybersecurity News – Straight To Your Inbox

Become a subscriber to the Anomali Newsletter
Receive a monthly summary of our latest threat intelligence content, research, news, events, and more.