Defining Threat Modeling and Threat Hunting
Questions
What would an attack look like?
What is the risk of losing confidentiality, integrity, or availability?
How likely is a specific threat?
What defenses do we have?
What is missing?
Adversary Capabilities: Develop and execute attacks
From MITRE:
Acquired
Augmented
Developed
Advanced
Integrated
Total Attack Surface: What you own and can be attacked
Corporate network
Cloud
Online Presence
Internal Apps
Building and People
Attack vector: how is the attack delivered
According to MITRE
Cyber
IT systems
Social media
Email
USB drives
Open ports
Physical
Doors
Locks
Access Cards
Surveillance
Human
Impersonation
Phishing
Coercion
Blackmail
Likelihood – How likely is the attack to happen?
Real threat or just a probable one?
Happened to use before? Happened to anyone else before?
Just an educated guess
Final Threat Modeling Questions
What’s the motivation behind an attack?
How do other companies defend themselves?
How frequent are attacks in your industry?
Cyber Threat Hunting
According to inforsec institute: “Cyber threat hunting is very similar to real-world hunting: it requires skill, patience, creativity, and a keen eye for spotting the prey”.
Be proactive
Act before you have proof
Don’t wait for a breach
This is not incident response
Threat hunting methodology
Start from scratch.
Establish a hypothesis
Look for threat actors
Look for IoCs
Justifying Threat Hunting
Have you been compromised?
Discovers new attack surface
Improves threat detection
Provides security intelligence
Identifies critical assets
Last updated