Common CTI Standards
Common CTI Standards
Importance of Standards:
Standards define how information is represented in files or communications, which is crucial for sharing and interpreting data accurately in cyber threat intelligence.
Scoring Standards:
CVSS (Common Vulnerability Scoring System):
Measures the severity of vulnerabilities using three metrics: base, temporal, and environmental.
Scores range from 0 to 10, with 10 being the most critical.
Example: Bluekeep (CVE-2019-0708) has a critical score of 9.8.
Threat Description or Taxonomy Standards:
OpenIOC:
Introduced by Mandiant in 2011.
Provides a standard format for describing threat artifacts using an XML schema.
CybOX (Cyber Observable Expression):
Standardized language for representing observables, now integrated into STIX 2.0.
STIX (Structured Threat Information Expression):
Structured language for describing cyber threat information.
Allows for consistent sharing, storing, and analysis of threat data.
Defines relationships between constructs, like linking a campaign to a threat actor.
Traffic Light Protocol (TLP):
Purpose: TLP is a simple protocol used to label sensitive information to ensure that only the correct audience has access to it.
Color Codes:
Red: Information is highly sensitive and should only be used by you. Do not share it with anyone, even within your organization.
Amber: Information can be shared within your organization on a need-to-know basis and with clients or customers who need it to protect themselves.
Green: Information is not very sensitive and can be shared with partners or peers, but not via public channels like websites.
White: Information is public and can be shared freely, considering standard copyright rules.
Trusted Automated Exchange of Indicator Information (TAXII):
Purpose: TAXII is an application protocol for exchanging threat intelligence over HTTPS. It defines a RESTful API and requirements for TAXII clients and servers.
Key Features:
Supports STIX: TAXII is designed to support the exchange of threat intelligence represented in STIX format.
Design Principles: Minimizes operational changes needed for adoption, integrates easily with existing sharing agreements, and supports various threat-sharing models (Hub and Spoke, Peer to Peer, Source Subscriber).
Examples: Free TAXII servers like Limo and Hail TAXII are compatible with TAXII 2 and STIX 2.
Last updated