Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats //

Vulnerability Management

02:00 PM
Michael Lortz
Michael Lortz
Connect Directly
E-Mail vvv

Making the Case for Process Documentation in Cyber Threat Intel

Standard language and processes, not to mention more efficient dissemination of findings and alerts all make documenting your security processes a must

As cyber threat intelligence grows as a field, assisting everyone from SOC analysts to C-suite executives, threat intel teams can benefit from process documentation and best practices. These concepts help build much-needed common tradecraft as well as language and procedures. In the field of intelligence, common tradecraft is essential.

During my time as a contractor at US Central Command in Tampa, Fla., I was part of a team that documented how intelligence was received, integrated, analyzed, and disseminated. I looked at information flows and processes from Tampa to the Defense Intelligence Agency, and to subordinate headquarters in Iraq and Afghanistan. After numerous interviews with analysts, team leaders, and division chiefs, my team was able to compose USCENTCOM Intelligence Directorate Best Practices. This document highlighted the most efficient and innovative processes used in one of the largest US military headquarters.

When posted on a shared network, these documents were often read, shared, and appropriated by many adjacent organizations in other US military headquarters. These organizations would post their own process documents on the shared network where teams could openly exchange ideas.

My success in documentation and process analysis was used in Afghanistan a few years later. I was specifically requested by leadership to document processes on intelligence sharing and dissemination between the US and partner nations. Instead of being shared with parallel organizations, these standard operating procedures (SOPs) were passed down to subordinate organizations, where they were often re-purposed for local use by military members in those units. These documents were used for both process guidance and inspiration.

By hiring people who are versed in documentation or instructional writing, greater understanding and efficient dissemination happened more regularly within the cyber threat intel community.

As a relatively new facet of information security, few organizations have achieved complete cyber threat intel programs. Most organizations are rightly focusing on acquiring feeds and growing analysts. This is a great start, but as cyber threat intel teams grow, they will have lessons learned and best practices they can share with others in the common fight against adversaries. Writing processes and lessons is vitally important. 

In a recent lecture, JD Work, chair for cyber conflict and security at the Marine Corps University, noted that the US intelligence community has decades of experience to offer the cyber threat intel community. Many best practices and intelligence processes have already been written and need only be reformatted, modified, and shared within different cyber threat intel communities. For example, the functions of collection management and how to develop priority intelligence requests (PIRs), essential elements of information (EEIs), or key performance indicators (KPIs) have been done for years and can assist nascent cyber threat intel programs. 

Intelligence process documentation similar to the documentation done at US Central Command and in support of intelligence in Afghanistan describes how processes are developed, codified, and trained. Documentation can also describe how intelligence is shared with other organizations. If centered around functions, intelligence documentation also allows for manpower analysis, as organizations can apply functions and effort to positions and hires.

Process documentation is rarely easy. It requires people to step away from their daily duties and write about how they are doing business. However, if an organization can create a separate position, it can tap into another trend in cyber threat intel: Hiring journalists.  

In a January 2019 article in Virus Bulletin, Martijn Grooten encouraged cyber threat intel teams to hire journalists for their skills in writing fast, distilling content, and being clear and concise. As a former college newspaper writer and frequent freelance writer, I can attest that journalists also bring skills to intelligence process documentation. The ability to interview personnel and ask questions about how jobs are done and tasks performed is essential in process documentation.

Intelligence is first and foremost a people business. While adversaries exchange ideas and learn offensive best practices, the cyber threat intel community can likewise share their own best practices and processes as the US military does in its intelligence organizations.

Employing cyber intelligence process analysts can ensure quality documentation, accelerate training, and facilitate a community exchange of ideas and better practices. A community of cyber threat intel process analysts can help discover best practices, inspire innovation, and integrate common tradecraft into organizational or industry needs. Understanding and documenting processes improves organizational effectiveness and efficiency, which not only leads to a better ROI, but can be a great force multiplier for cyber threat intel organizations.

Related Content:

A listing of free products and services compiled for Dark Reading by Omdia analysts to help meet the challenges of COVID-19. 

Michael Lortz is an instructor of Cyber Threat Intelligence and Strategy in Tampa, Fla. He has over 20 years of experience providing intelligence support to leaders in the government and private sectors. He has documented intelligence best practices in Bosnia, Afghanistan, ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Mobile App Fraud Jumped in Q1 as Attackers Pivot from Browsers
Jai Vijayan, Contributing Writer,  7/10/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-10
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authenticati...
PUBLISHED: 2020-07-10
In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in...
PUBLISHED: 2020-07-10
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to...
PUBLISHED: 2020-07-10
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...
PUBLISHED: 2020-07-10
An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerabi...