To understand our security we must understand our adversary1. More specifically we need sufficient evidence about relevant threats, in enough time, to allow for good, informed decisions.
Successful threat intelligence helps security teams to better understand previous, existing, and emerging threats; encouraging them to shift from reactive to proactive responses.
Identifying and profiling potential threats effectively leads to better detection, prevention, and remediation, because security teams can then put in place the most effective solutions for those particular threats.
In this case, a threat is an intention to cause harm to your assets. A ‘threat’ consists of an ‘actor’ with ‘capability’, and ‘motivation’ to attack. Attacks might be intentional or unintentional, physical or digital. While we will focus on intentional, digital attacks in this playbook, the others should of course be part of your overall risk assessment.
An Adversary (or ‘enemy’ or threat actor’, or ‘threat source’ in some material) attempts to maliciously attack specific targets. An adversary may be an individual, a group, or even some semi-autonomous computer systems.
Some risk assessment systems also include natural disasters such as earthquakes under ‘threat sources’, but these are a very different category of threat that should be approached differently. We do not include them here.
Even ‘unintentional’ actors (for example, staff accidentally deleting data) might be better excluded from this particular assessment as they too should be prepared for, monitored for, and responded to differently.
To help simplify the large range of possible combinations, we have a list of Adversary types to provide some templates or stereotypes that we can analyse, for example:
Name | Description | Categories | Code |
---|---|---|---|
Skilled Hackers | Breaks into computer systems for fun or profit; installing malware, stealing or destroying data, disrupting service, and more. Can be ethical bad and good (eg trying to find software vulnerabilities so they can be fixed). Can be employed by Foreign Intelligence Services or Serious Organised Crime. | Individual Outsider | TS-HACKER |
Script Kiddies | Uses ready-made exploitation code (scripts) to attack systems that have legacy vulnerabilities due to not being updated or otherwise secured | Individual Outsider | TS-SKID |
Journalists | interested in information gained through computer breaches, especially those created by public authorities and that could be news worthy. This could include direct or assisted probing of ICT for weaknesses. | Individual Outsider | TS-JOURNA |
Casual Bystander | Someone who has physical access to the assets without explicit access being granted (eg cleaners, visitors, etc) and internally motivated by money, curiosity, revenge, etc to take advantage of opportunity. | Individual Insider | TS-BYSTAND |
Deliberate Bystander | Someone who has arranged for physical access to the assets without explicit access being granted (eg cleaners, visitors, etc), or is externally motivated to look for and encourage opportunities to take advantage of | Individual Insider | TS-BYSTAND-EX |
Trusted Insider | Insider with access to the infrastructure, business processes and physical environment; perhaps motivated by greed, fame, fun, 'whistleblower' or transient anger | Individual Trusted Insider | TS-INSIDER |
Trusted Insider | Insider with access to the infrastructure, business processes and physical environment who also have access to external skills and resources | Individual Trusted Insider | TS-INSIDER-EX |
Privileged Insider | Insiders (eg ITSO, maintainers and Admins) who have privileged access and more knowledge about and access to the infrastructure | Individual Privileged Insider | TS-PRIVINS |
Partner | An organisation with deep collaboration meshes including access to many internal information systems | Organisation Partner | TS-PARTNER |
Foreign Intelligence Services | Organisation Outsider | TS-FIS |
Adversaries are scored by Capability and Intent (general and specifically to you).
You can then score which of these actors are more relevant to your situation; which of them essentially are both more capable and more motivated to attack your assets compared to others. This can give you the more relevant and likely threats to focus on.
We provide a starter threats registry which has some adversaries and attacks already listed.
Know Your Enemy: Understanding Threat Actors | CSO Online
What Is A Threat Actor? | Cyber Threat Actors | Blog | Nexor
Creating a Threat Profile for Your Organization (giac.org)
Sun Tzu “Art of War” and pretty much every other classical book on conflict since ↩