Threat Hunting Team

Threat Management Frameworks for APT Activity

Question

A threat hunting team receives a report about possible APT activity in the network.

Which of the following threat management frameworks should the team implement?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

A.

https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-30r1.pdf

When dealing with advanced persistent threats (APTs), threat hunting teams must use a framework to effectively identify and mitigate the threat. Each framework has its own approach and methodology, and selecting the most appropriate one can depend on a variety of factors such as the nature and scope of the threat, the organization's resources, and the team's expertise.

Here are the detailed explanations for each of the four options:

A. NIST SP 800-53 NIST SP 800-53 is a comprehensive framework for information security management that provides guidelines for the selection, implementation, and assessment of security controls. It is intended for use by federal agencies and is based on the Federal Information Security Management Act (FISMA). While it does include guidance for threat management, it may not be the most appropriate framework for APTs as it primarily focuses on implementing and managing security controls, rather than identifying and mitigating specific threats.

B. MITRE ATT&CK MITRE ATT&CK is a globally recognized knowledge base of adversary tactics, techniques, and procedures (TTPs) that organizations can use to understand and map out the various stages of a cyber attack. It helps organizations to better understand and identify the tactics, techniques, and procedures (TTPs) used by an adversary during a cyber attack, and to implement appropriate countermeasures. The framework is particularly useful for identifying and mitigating APTs, as it provides a detailed and structured approach for understanding and analyzing their tactics and techniques.

C. The Cyber Kill Chain The Cyber Kill Chain is a framework developed by Lockheed Martin that describes the stages of a cyber attack, from initial reconnaissance to data exfiltration. It helps organizations to understand and visualize the stages of an attack, and to implement appropriate countermeasures at each stage. While it is useful for understanding the various stages of an attack, it may not be as comprehensive as other frameworks when it comes to identifying specific APTs.

D. The Diamond Model of Intrusion Analysis The Diamond Model of Intrusion Analysis is a framework that helps organizations to analyze and understand cyber threats by identifying four key elements: adversary, capability, infrastructure, and victim. It helps organizations to map out the relationships between these elements and to identify potential vulnerabilities and attack paths. While it is a useful framework for understanding APTs, it may not be as structured and comprehensive as some of the other frameworks, such as MITRE ATT&CK.

In conclusion, while all of the frameworks have their advantages, MITRE ATT&CK is likely the most appropriate for identifying and mitigating APTs as it provides a detailed and structured approach for understanding and analyzing their tactics and techniques. However, it's important to remember that selecting the most appropriate framework will depend on a variety of factors, and threat hunting teams should evaluate each framework carefully to determine which one is best suited to their needs.