Skip to content
CSY301 Week 11 Advanced

Practice building shareable intelligence before moving to reading resources.

Threat Intelligence

Track your progress through this week's content

Opening Framing

A single organization defending against sophisticated threat actors is like one soldier facing an army. But thousands of organizations sharing intelligence—each contributing what they see, each benefiting from what others learn—creates a collective defense that no adversary can fully evade. When one organization detects a new attack, shared intelligence can protect thousands of others before they're targeted.

Intelligence sharing transforms individual defense into collective security. ISACs (Information Sharing and Analysis Centers) connect organizations within sectors. Government agencies distribute advisories. Commercial vendors aggregate threat data. And informal communities of trust share insights that never appear in public reports. Effective participation in these ecosystems multiplies your defensive capabilities.

This week covers sharing frameworks and communities, legal and trust considerations, sharing standards and protocols, building sharing relationships, and measuring sharing value. You'll learn to both contribute to and benefit from the collective intelligence ecosystem.

Key insight: Sharing isn't charity—it's strategy. What you give comes back multiplied.

1) The Intelligence Sharing Ecosystem

Multiple overlapping communities and channels enable threat intelligence sharing:

Sharing Ecosystem Overview:

┌─────────────────────────────────────────────────────────────┐
│                   SHARING LANDSCAPE                         │
├─────────────────────────────────────────────────────────────┤
│                                                             │
│  GOVERNMENT ◄──────────────────────────────► PRIVATE SECTOR │
│      │                                             │        │
│      │    ┌─────────────────────────────┐          │        │
│      │    │         ISACs/ISAOs         │          │        │
│      │    │   (Sector-Specific Sharing) │          │        │
│      │    └─────────────────────────────┘          │        │
│      │                  │                          │        │
│      ▼                  ▼                          ▼        │
│  ┌──────────┐    ┌──────────────┐    ┌──────────────────┐   │
│  │   CISA   │    │  Commercial  │    │  Informal Trust  │   │
│  │ FBI/NSA  │    │    Feeds     │    │     Groups       │   │
│  │  Alerts  │    │   Vendors    │    │  Peer Networks   │   │
│  └──────────┘    └──────────────┘    └──────────────────┘   │
│                                                             │
└─────────────────────────────────────────────────────────────┘

Key Sharing Organizations:

Information Sharing Organizations:

ISACs (Information Sharing and Analysis Centers):
┌─────────────────────────────────────────────────────────────┐
│ Sector-specific sharing communities                         │
│                                                             │
│ Major ISACs:                                                │
│ - FS-ISAC (Financial Services)                              │
│ - H-ISAC (Healthcare)                                       │
│ - MS-ISAC (State/Local Government)                          │
│ - IT-ISAC (Information Technology)                          │
│ - E-ISAC (Electricity)                                      │
│ - A-ISAC (Aviation)                                         │
│ - RH-ISAC (Retail & Hospitality)                            │
│ - ONG-ISAC (Oil & Natural Gas)                              │
│                                                             │
│ Value:                                                      │
│ - Sector-specific threat intelligence                       │
│ - Peer connections within industry                          │
│ - Coordinated response during sector-wide incidents         │
│ - Trusted sharing environment                               │
│                                                             │
│ Membership: Usually requires membership fee                 │
└─────────────────────────────────────────────────────────────┘

ISAOs (Information Sharing and Analysis Organizations):
┌─────────────────────────────────────────────────────────────┐
│ More flexible than ISACs, not sector-limited                │
│                                                             │
│ Examples:                                                   │
│ - Regional sharing groups                                   │
│ - Topic-specific communities (ransomware, etc.)             │
│ - Cross-sector initiatives                                  │
│                                                             │
│ Value: Flexibility, specific focus areas                    │
└─────────────────────────────────────────────────────────────┘

Government Programs:
┌─────────────────────────────────────────────────────────────┐
│ CISA (Cybersecurity and Infrastructure Security Agency):    │
│ - Alerts and advisories                                     │
│ - AIS (Automated Indicator Sharing)                         │
│ - Joint Cyber Defense Collaborative (JCDC)                  │
│                                                             │
│ FBI:                                                        │
│ - InfraGard (FBI-private sector partnership)                │
│ - IC3 (Internet Crime Complaint Center)                     │
│ - Flash reports and Private Industry Notifications          │
│                                                             │
│ NSA/CYBERCOM:                                               │
│ - Cybersecurity advisories                                  │
│ - Threat actor disclosures                                  │
│                                                             │
│ Value: Classified-derived intelligence, legal authority     │
└─────────────────────────────────────────────────────────────┘

Commercial Sharing:
┌─────────────────────────────────────────────────────────────┐
│ Threat Intelligence Platforms:                              │
│ - Aggregate data from customers                             │
│ - Share anonymized insights                                 │
│ - Provide enriched intelligence                             │
│                                                             │
│ Vendor Communities:                                         │
│ - Microsoft Security Intelligence                           │
│ - CrowdStrike Falcon Intelligence                           │
│ - Recorded Future Insikt Group                              │
│                                                             │
│ Value: Scale, automation, enrichment                        │
└─────────────────────────────────────────────────────────────┘

Informal Sharing:

Informal Sharing Networks:

PEER NETWORKS:
┌─────────────────────────────────────────────────────────────┐
│ Description:                                                │
│ - Personal relationships between security professionals     │
│ - Often built at conferences, previous employers            │
│ - High trust, fast sharing                                  │
│                                                             │
│ Channels:                                                   │
│ - Direct messaging (Signal, etc.)                           │
│ - Private Slack/Discord servers                             │
│ - Mailing lists                                             │
│ - Conference hallway conversations                          │
│                                                             │
│ Value:                                                      │
│ - Fastest sharing channel                                   │
│ - Highest trust                                             │
│ - Context-rich intelligence                                 │
│ - "What are you seeing?" real-time exchange                 │
│                                                             │
│ Challenge: Doesn't scale, relationship-dependent            │
└─────────────────────────────────────────────────────────────┘

COMMUNITY PLATFORMS:
┌─────────────────────────────────────────────────────────────┐
│ Twitter/X Security Community:                               │
│ - Real-time threat discussion                               │
│ - Malware sample sharing                                    │
│ - Vulnerability disclosure                                  │
│                                                             │
│ MalwareBazaar / VirusTotal:                                 │
│ - Sample sharing                                            │
│ - Community tagging                                         │
│ - Analysis sharing                                          │
│                                                             │
│ GitHub:                                                     │
│ - Detection rules (Sigma, YARA)                             │
│ - Tool development                                          │
│ - Threat research                                           │
│                                                             │
│ Value: Open access, large community                         │
│ Challenge: Quality varies, attribution uncertain            │
└─────────────────────────────────────────────────────────────┘

TRUST GROUPS:
┌─────────────────────────────────────────────────────────────┐
│ Description:                                                │
│ - Invite-only groups of vetted professionals                │
│ - Often regional or role-specific (CISOs, IR, etc.)         │
│ - Operate under sharing agreements                          │
│                                                             │
│ Examples:                                                   │
│ - Regional CISO roundtables                                 │
│ - Incident response community groups                        │
│ - Threat intel analyst networks                             │
│                                                             │
│ Value: High trust + specific relevance                      │
└─────────────────────────────────────────────────────────────┘

Key insight: Different sharing channels serve different needs. Participate in multiple channels for comprehensive coverage.

2) Legal and Trust Frameworks

Effective sharing requires navigating legal requirements and establishing trust:

Legal Considerations:

CYBERSECURITY INFORMATION SHARING ACT (CISA 2015):
┌─────────────────────────────────────────────────────────────┐
│ US law enabling threat information sharing                  │
│                                                             │
│ Key Provisions:                                             │
│ - Authorizes sharing cyber threat indicators                │
│ - Provides liability protection for sharing                 │
│ - Requires removal of personal information                  │
│ - Enables sharing with federal government                   │
│                                                             │
│ Protections:                                                │
│ - Antitrust exemption for sharing                           │
│ - FOIA exemption for shared information                     │
│ - Liability protection when done properly                   │
│                                                             │
│ Requirements:                                               │
│ - Remove PII not related to threat                          │
│ - Share for cybersecurity purposes                          │
│ - Follow specified procedures                               │
└─────────────────────────────────────────────────────────────┘

PRIVACY CONSIDERATIONS:
┌─────────────────────────────────────────────────────────────┐
│ What CAN be shared:                                         │
│ - Technical indicators (IPs, domains, hashes)               │
│ - Attack patterns and TTPs                                  │
│ - Vulnerability information                                 │
│ - Anonymized incident data                                  │
│                                                             │
│ What requires CAUTION:                                      │
│ - Victim identifying information                            │
│ - Employee data                                             │
│ - Customer information                                      │
│ - Attribution claims                                        │
│                                                             │
│ GDPR/Privacy Law Considerations:                            │
│ - IP addresses may be personal data in EU                   │
│ - Legitimate interest basis for security sharing            │
│ - Minimize personal data in shared intelligence             │
└─────────────────────────────────────────────────────────────┘

REGULATORY REQUIREMENTS:
┌─────────────────────────────────────────────────────────────┐
│ Some sectors REQUIRE sharing:                               │
│                                                             │
│ - Financial Services: Various reporting requirements        │
│ - Healthcare: HHS breach reporting                          │
│ - Critical Infrastructure: CIRCIA (coming)                  │
│ - Defense Industrial Base: DFARS 7012                       │
│                                                             │
│ Know your sector's requirements                             │
└─────────────────────────────────────────────────────────────┘

Traffic Light Protocol (TLP):

Traffic Light Protocol (TLP) 2.0:

PURPOSE:
Standard for indicating sharing restrictions on
sensitive information

TLP:CLEAR
┌─────────────────────────────────────────────────────────────┐
│ Color: White/No restriction                                 │
│ Sharing: Unlimited - public disclosure permitted            │
│                                                             │
│ Use when:                                                   │
│ - Information is already public                             │
│ - No harm from public disclosure                            │
│ - Widest dissemination desired                              │
│                                                             │
│ Example: Published CVE details, public advisories           │
└─────────────────────────────────────────────────────────────┘

TLP:GREEN
┌─────────────────────────────────────────────────────────────┐
│ Color: Green                                                │
│ Sharing: Community-wide, but not public                     │
│                                                             │
│ Use when:                                                   │
│ - Useful to broader community                               │
│ - Should not be published publicly                          │
│ - Can share within peer organizations                       │
│                                                             │
│ Example: IOCs from incident, general threat warnings        │
└─────────────────────────────────────────────────────────────┘

TLP:AMBER
┌─────────────────────────────────────────────────────────────┐
│ Color: Amber                                                │
│ Sharing: Limited to organization + need-to-know             │
│                                                             │
│ TLP:AMBER: Share with members of own organization           │
│            who need to know                                 │
│                                                             │
│ TLP:AMBER+STRICT: Share only within own organization,       │
│                   not with clients or partners              │
│                                                             │
│ Use when:                                                   │
│ - Effective response requires limited sharing               │
│ - Broader sharing could cause harm                          │
│                                                             │
│ Example: Detailed incident information, victim names        │
└─────────────────────────────────────────────────────────────┘

TLP:RED
┌─────────────────────────────────────────────────────────────┐
│ Color: Red                                                  │
│ Sharing: Only specific recipients, no further sharing       │
│                                                             │
│ Use when:                                                   │
│ - Information is extremely sensitive                        │
│ - Sharing beyond recipients would cause harm                │
│ - Typically verbal or in-person only                        │
│                                                             │
│ Example: Active investigation details, source protection    │
└─────────────────────────────────────────────────────────────┘

TLP IN PRACTICE:
- Always label shared intelligence with TLP
- Respect TLP designations from others
- When in doubt, use more restrictive level
- TLP can be downgraded over time
- Never upgrade without source permission

Building Trust:

Trust Framework:

TRUST ELEMENTS:
┌─────────────────────────────────────────────────────────────┐
│ 1. IDENTITY VERIFICATION                                    │
│    - Know who you're sharing with                           │
│    - Verify organizational affiliation                      │
│    - Vet individuals before sensitive sharing               │
│                                                             │
│ 2. RECIPROCITY                                              │
│    - Two-way sharing relationship                           │
│    - Contributors, not just consumers                       │
│    - Share even when it's uncomfortable                     │
│                                                             │
│ 3. CONFIDENTIALITY                                          │
│    - Protect shared information appropriately               │
│    - Honor TLP designations                                 │
│    - Don't attribute without permission                     │
│                                                             │
│ 4. RELIABILITY                                              │
│    - Share accurate information                             │
│    - Correct errors quickly                                 │
│    - Maintain quality standards                             │
│                                                             │
│ 5. TIMELINESS                                               │
│    - Share when information is actionable                   │
│    - Don't sit on useful intelligence                       │
│    - Respond to requests promptly                           │
└─────────────────────────────────────────────────────────────┘

EARNING TRUST:
┌─────────────────────────────────────────────────────────────┐
│ Start Small:                                                │
│ - Share lower-sensitivity intelligence first                │
│ - Build track record of reliability                         │
│ - Demonstrate handling of received intelligence             │
│                                                             │
│ Add Value:                                                  │
│ - Share unique insights, not just re-shared content         │
│ - Provide context and analysis                              │
│ - Respond helpfully to questions                            │
│                                                             │
│ Be Consistent:                                              │
│ - Regular participation, not just during crises             │
│ - Follow through on commitments                             │
│ - Maintain relationships over time                          │
└─────────────────────────────────────────────────────────────┘

Key insight: Trust is the currency of intelligence sharing. Build it slowly, protect it carefully, never abuse it.

3) Sharing Standards and Automation

Technical standards enable automated, scalable intelligence sharing:

Intelligence Sharing Standards:

STIX (Structured Threat Information Expression):
┌─────────────────────────────────────────────────────────────┐
│ Purpose: Standard language for threat intelligence          │
│ Version: STIX 2.1 (current)                                 │
│                                                             │
│ Core Objects:                                               │
│ ┌─────────────────────────────────────────────────────────┐ │
│ │ Attack Pattern  │ TTP description (maps to ATT&CK)      │ │
│ │ Campaign        │ Named attack campaign                 │ │
│ │ Course of Action│ Recommended response                  │ │
│ │ Identity        │ Person or organization                │ │
│ │ Indicator       │ Detection pattern (IOCs)              │ │
│ │ Infrastructure  │ Systems used by adversary             │ │
│ │ Intrusion Set   │ Adversary behaviors                   │ │
│ │ Malware         │ Malware description                   │ │
│ │ Observed Data   │ Raw observations                      │ │
│ │ Report          │ Intelligence report                   │ │
│ │ Threat Actor    │ Adversary profile                     │ │
│ │ Tool            │ Software used                         │ │
│ │ Vulnerability   │ Weakness (CVE)                        │ │
│ └─────────────────────────────────────────────────────────┘ │
│                                                             │
│ Relationship Objects:                                       │
│ - Link any objects together                                 │
│ - Types: uses, targets, indicates, mitigates, etc.          │
└─────────────────────────────────────────────────────────────┘

STIX Example:
{
  "type": "bundle",
  "id": "bundle--example",
  "objects": [
    {
      "type": "indicator",
      "id": "indicator--abc123",
      "created": "2024-03-15T12:00:00Z",
      "name": "Malicious IP",
      "pattern": "[ipv4-addr:value = '192.168.1.100']",
      "pattern_type": "stix",
      "valid_from": "2024-03-15T00:00:00Z",
      "labels": ["malicious-activity"]
    },
    {
      "type": "malware",
      "id": "malware--def456",
      "name": "Evil RAT",
      "malware_types": ["remote-access-trojan"],
      "is_family": true
    },
    {
      "type": "relationship",
      "id": "relationship--ghi789",
      "relationship_type": "indicates",
      "source_ref": "indicator--abc123",
      "target_ref": "malware--def456"
    }
  ]
}

TAXII (Transport Protocol):

TAXII (Trusted Automated eXchange of Intelligence Info):

PURPOSE:
Transport mechanism for sharing STIX content

TAXII 2.1 CONCEPTS:
┌─────────────────────────────────────────────────────────────┐
│ Server: Hosts threat intelligence                           │
│ ┌─────────────────────────────────────────────────────────┐ │
│ │ API Root                                                │ │
│ │ └── Collection 1 (e.g., "Ransomware IOCs")              │ │
│ │ │   └── STIX Objects                                    │ │
│ │ └── Collection 2 (e.g., "APT Activity")                 │ │
│ │     └── STIX Objects                                    │ │
│ └─────────────────────────────────────────────────────────┘ │
│                                                             │
│ Client: Consumes or contributes intelligence                │
│ - Poll: Request objects from collection                     │
│ - Push: Add objects to collection                           │
└─────────────────────────────────────────────────────────────┘

TAXII OPERATIONS:

GET /collections/
- List available collections

GET /collections/{id}/objects/
- Retrieve objects from collection
- Filter by type, date, etc.

POST /collections/{id}/objects/
- Add new objects to collection

Example Request:
GET /taxii2/collections/abc123/objects/
    ?added_after=2024-03-14T00:00:00Z
    &type=indicator

Response: STIX bundle with matching indicators

Automated Sharing Implementation:

Automated Sharing Architecture:

┌─────────────────────────────────────────────────────────────┐
│                   YOUR ORGANIZATION                         │
│  ┌──────────────────────────────────────────────────────┐   │
│  │              THREAT INTEL PLATFORM                   │   │
│  │  ┌──────────┐  ┌───────────┐  ┌────────────────┐     │   │
│  │  │ Internal │  │ Analysis  │  │ Dissemination  │     │   │
│  │  │  Data    │  │  Engine   │  │    Module      │     │   │
│  │  └────┬─────┘  └─────┬─────┘  └───────┬────────┘     │   │
│  │       │              │                │              │   │
│  │       └──────────────┴────────────────┘              │   │
│  └──────────────────────┬───────────────────────────────┘   │
│                         │                                   │
│             ┌───────────┴───────────┐                       │
│             │    TAXII Client       │                       │
│             └───────────┬───────────┘                       │
└─────────────────────────┼───────────────────────────────────┘
                          │
         ┌────────────────┼────────────────┐
         │                │                │
         ▼                ▼                ▼
┌─────────────┐   ┌─────────────┐   ┌─────────────┐
│    ISAC     │   │    CISA     │   │  Commercial │
│   TAXII     │   │    AIS      │   │    Feed     │
│   Server    │   │   Server    │   │   Server    │
└─────────────┘   └─────────────┘   └─────────────┘

Automation Benefits:
- Real-time sharing (no manual steps)
- Consistent formatting
- Scalable to many sources
- Reduced analyst burden
- Faster time-to-protection

Implementation Considerations:
- Quality filtering (don't ingest everything)
- Deduplication
- Confidence scoring
- Aging/expiration
- False positive management

MISP (Malware Information Sharing Platform):

MISP Overview:

PURPOSE:
Open source threat intelligence sharing platform

FEATURES:
┌─────────────────────────────────────────────────────────────┐
│ - Event-based intelligence storage                          │
│ - Attribute types for all IOC types                         │
│ - Correlation engine                                        │
│ - Taxonomies and tagging                                    │
│ - Sharing groups                                            │
│ - Feed ingestion                                            │
│ - STIX/TAXII support                                        │
│ - API for automation                                        │
│ - Synchronization between instances                         │
└─────────────────────────────────────────────────────────────┘

MISP STRUCTURE:
Event
├── Attributes (IOCs)
│   ├── IP address
│   ├── Domain
│   ├── File hash
│   └── ...
├── Objects (structured groups)
│   ├── File object
│   ├── Network object
│   └── ...
├── Tags (taxonomies)
│   ├── tlp:amber
│   ├── malware_classification:ransomware
│   └── ...
└── Sharing group

USE CASES:
- Internal TIP (Threat Intelligence Platform)
- ISAC infrastructure
- Cross-organization sharing
- Feed aggregation
- Incident tracking

Key insight: Standards enable scale. Manual sharing works for occasional collaboration; automation works for continuous intelligence exchange.

4) Effective Sharing Practices

Being an effective sharing partner means contributing quality intelligence and using received intelligence well:

What to Share:

HIGH-VALUE SHARING:
┌─────────────────────────────────────────────────────────────┐
│ Incident-Derived Intelligence:                              │
│ - IOCs from confirmed incidents                             │
│ - TTPs observed in attacks                                  │
│ - Attack timelines and progression                          │
│ - Lessons learned                                           │
│                                                             │
│ Why valuable: First-hand, verified, contextual              │
└─────────────────────────────────────────────────────────────┘

┌─────────────────────────────────────────────────────────────┐
│ Novel Discoveries:                                          │
│ - New malware samples                                       │
│ - Unreported infrastructure                                 │
│ - New TTPs or variations                                    │
│ - Zero-day exploitation                                     │
│                                                             │
│ Why valuable: Not available elsewhere                       │
└─────────────────────────────────────────────────────────────┘

┌─────────────────────────────────────────────────────────────┐
│ Sector-Specific Insights:                                   │
│ - Industry targeting patterns                               │
│ - Sector-specific attack methods                            │
│ - Regulatory-relevant threats                               │
│                                                             │
│ Why valuable: Relevant to peer organizations                │
└─────────────────────────────────────────────────────────────┘

┌─────────────────────────────────────────────────────────────┐
│ Analysis and Context:                                       │
│ - Attribution assessments                                   │
│ - Trend analysis                                            │
│ - Threat actor updates                                      │
│ - Campaign tracking                                         │
│                                                             │
│ Why valuable: Transforms data into intelligence             │
└─────────────────────────────────────────────────────────────┘

LOW-VALUE SHARING (Avoid):
┌─────────────────────────────────────────────────────────────┐
│ - Re-sharing public reports without adding value            │
│ - Unvalidated IOCs from unknown sources                     │
│ - Aged intelligence without current relevance               │
│ - Information without context                               │
│ - Noise (commodity malware, scanning activity)              │
└─────────────────────────────────────────────────────────────┘

Quality Standards:

Intelligence Quality Checklist:

BEFORE SHARING, VERIFY:

□ ACCURACY
  - Is this information verified?
  - What is the confidence level?
  - Have you validated indicators?

□ CONTEXT
  - Is sufficient context provided?
  - Can recipient understand relevance?
  - Is the threat explained?

□ ACTIONABILITY
  - Can recipient act on this?
  - Are defensive recommendations included?
  - Is timing still relevant?

□ PRIVACY
  - Is PII removed/minimized?
  - Are victim identities protected?
  - Is source protection maintained?

□ FORMATTING
  - Is TLP correctly applied?
  - Is format standard (STIX preferred)?
  - Are attributes properly typed?

QUALITY INDICATOR EXAMPLE:

Poor Quality:
"Bad IP: 192.168.1.100"

Good Quality:
┌─────────────────────────────────────────────────────────────┐
│ Indicator: 192.168.1.100                                    │
│ Type: IPv4 Address                                          │
│ Context: Cobalt Strike C2 server                            │
│ First Seen: 2024-03-10                                      │
│ Last Seen: 2024-03-15                                       │
│ Confidence: High (observed in confirmed incident)           │
│ Source: Internal incident investigation                     │
│ Related: SHA256 hash of beacon, domain aliases              │
│ ATT&CK: T1071.001 (Web Protocols)                           │
│ TLP: AMBER                                                  │
│ Recommendation: Block at firewall, alert on connection      │
│ Validity: Likely active 30 days based on actor pattern      │
└─────────────────────────────────────────────────────────────┘

Receiving and Using Intelligence:

Using Received Intelligence:

INTAKE PROCESS:
┌─────────────────────────────────────────────────────────────┐
│ 1. RECEIVE                                                  │
│    - Automated ingestion where possible                     │
│    - Manual review for high-value/sensitive                 │
│    - Document source and TLP                                │
│                                                             │
│ 2. VALIDATE                                                 │
│    - Check source reliability                               │
│    - Verify technical accuracy                              │
│    - Assess relevance to organization                       │
│                                                             │
│ 3. ENRICH                                                   │
│    - Add internal context                                   │
│    - Correlate with existing intelligence                   │
│    - Check against local data                               │
│                                                             │
│ 4. OPERATIONALIZE                                           │
│    - Create detections where appropriate                    │
│    - Update block lists                                     │
│    - Brief relevant teams                                   │
│    - Track in TIP                                           │
│                                                             │
│ 5. FEEDBACK                                                 │
│    - Report hits/matches to source                          │
│    - Share false positive findings                          │
│    - Confirm usefulness                                     │
└─────────────────────────────────────────────────────────────┘

OPERATIONALIZATION MATRIX:

Intelligence Type → Action
┌─────────────────────┬─────────────────────────────────────┐
│ Critical threat     │ Immediate blocking, alert creation, │
│ to sector           │ leadership notification             │
├─────────────────────┼─────────────────────────────────────┤
│ Active campaign     │ Detection rules, hunting queries,   │
│ IOCs                │ block lists                         │
├─────────────────────┼─────────────────────────────────────┤
│ Threat actor        │ Update threat model, adjust         │
│ profile update      │ priorities, brief teams             │
├─────────────────────┼─────────────────────────────────────┤
│ TTP information     │ Detection development, purple       │
│                     │ team exercise planning              │
├─────────────────────┼─────────────────────────────────────┤
│ Strategic trends    │ Risk assessment update,             │
│                     │ executive briefing                  │
└─────────────────────┴─────────────────────────────────────┘

Key insight: Good sharing partners both give and receive well. Use intelligence you receive, and share back what you learn.

5) Building Sharing Programs

Effective intelligence sharing requires organizational commitment and structure:

Sharing Program Components:

GOVERNANCE:
┌─────────────────────────────────────────────────────────────┐
│ Sharing Policy:                                             │
│ - What can be shared (and what cannot)                      │
│ - Approval requirements by sensitivity                      │
│ - TLP handling procedures                                   │
│ - Legal and compliance requirements                         │
│                                                             │
│ Roles:                                                      │
│ - Sharing coordinator (primary contact)                     │
│ - Approval authority                                        │
│ - Legal review (when needed)                                │
│ - Technical implementation                                  │
│                                                             │
│ Relationships:                                              │
│ - ISAC membership and participation                         │
│ - Government partnerships                                   │
│ - Peer relationships                                        │
│ - Vendor coordination                                       │
└─────────────────────────────────────────────────────────────┘

OPERATIONS:
┌─────────────────────────────────────────────────────────────┐
│ Inbound Intelligence:                                       │
│ - Feed management                                           │
│ - Manual intelligence review                                │
│ - Quality assessment                                        │
│ - Operationalization workflow                               │
│                                                             │
│ Outbound Intelligence:                                      │
│ - Incident-derived sharing                                  │
│ - Research and analysis sharing                             │
│ - Contribution tracking                                     │
│ - Partner notification                                      │
│                                                             │
│ Technical Infrastructure:                                   │
│ - TIP (Threat Intelligence Platform)                        │
│ - TAXII server/client                                       │
│ - Secure communication channels                             │
│ - Integration with security tools                           │
└─────────────────────────────────────────────────────────────┘

Measuring Sharing Value:

Sharing Program Metrics:

CONTRIBUTION METRICS:
┌─────────────────────────────────────────────────────────────┐
│ - Intelligence items shared (count)                         │
│ - Unique vs. derivative contributions                       │
│ - Feedback received on shared intelligence                  │
│ - Community recognition/reputation                          │
│                                                             │
│ Goal: Track that you're contributing, not just consuming    │
└─────────────────────────────────────────────────────────────┘

CONSUMPTION VALUE:
┌─────────────────────────────────────────────────────────────┐
│ - Shared intelligence hits in environment                   │
│ - Threats detected via shared indicators                    │
│ - Incidents prevented through early warning                 │
│ - Time saved through shared analysis                        │
│                                                             │
│ Goal: Quantify value received from sharing communities      │
└─────────────────────────────────────────────────────────────┘

RELATIONSHIP HEALTH:
┌─────────────────────────────────────────────────────────────┐
│ - Active sharing relationships (count)                      │
│ - Response time to requests                                 │
│ - Reciprocity ratio (give vs. receive)                      │
│ - Community participation level                             │
│                                                             │
│ Goal: Ensure sustainable, healthy relationships             │
└─────────────────────────────────────────────────────────────┘

Example Dashboard:

Intelligence Sharing - Q1 2024
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

Contributions:
- Indicators shared: 450
- Reports shared: 12
- Unique (first-hand): 85%
- Partner feedback: 15 positive responses

Consumption:
- Indicators received: 12,500
- Operationalized: 2,100 (17%)
- Detection hits: 45
- Incidents informed: 3

Relationships:
- Active ISAC membership: 2
- Government partnerships: 3
- Peer relationships: 15
- Reciprocity ratio: 1:28 (giving more)

Overcoming Sharing Barriers:

Common Barriers and Solutions:

BARRIER: "We can't share—it's too sensitive"
┌─────────────────────────────────────────────────────────────┐
│ Solutions:                                                  │
│ - Use TLP to control distribution                           │
│ - Anonymize victim-specific details                         │
│ - Share TTPs without revealing incident                     │
│ - Start with lower-sensitivity items                        │
│ - Get legal approval for sharing policy                     │
└─────────────────────────────────────────────────────────────┘

BARRIER: "We don't have anything worth sharing"
┌─────────────────────────────────────────────────────────────┐
│ Solutions:                                                  │
│ - Every incident has shareable intelligence                 │
│ - Analysis of public information adds value                 │
│ - Even "negative" findings are useful                       │
│ - Questions to community are contributions                  │
│ - Detection rules are valuable sharing                      │
└─────────────────────────────────────────────────────────────┘

BARRIER: "We don't have time for sharing"
┌─────────────────────────────────────────────────────────────┐
│ Solutions:                                                  │
│ - Build sharing into incident response process              │
│ - Automate where possible (STIX/TAXII)                      │
│ - Assign dedicated sharing coordinator                      │
│ - Make sharing part of analyst workflow                     │
│ - Use templates to reduce effort                            │
└─────────────────────────────────────────────────────────────┘

BARRIER: "We're just going to help competitors"
┌─────────────────────────────────────────────────────────────┐
│ Solutions:                                                  │
│ - Adversaries are the real competitor                       │
│ - Rising tide lifts all boats                               │
│ - Sector incidents hurt entire industry                     │
│ - What you receive far exceeds what you give                │
│ - Reputation benefits of being good partner                 │
└─────────────────────────────────────────────────────────────┘

BARRIER: "Legal won't approve"
┌─────────────────────────────────────────────────────────────┐
│ Solutions:                                                  │
│ - Educate legal on CISA 2015 protections                    │
│ - Develop pre-approved sharing procedures                   │
│ - Use ISACs (built-in legal frameworks)                     │
│ - Create sharing agreement templates                        │
│ - Start with government sharing (clear legal basis)         │
└─────────────────────────────────────────────────────────────┘

Key insight: The organizations that share most effectively also receive the most value. Invest in sharing relationships as you would any strategic partnership.

Real-World Context

Case Study: ISAC Early Warning Success

During a coordinated ransomware campaign targeting healthcare, H-ISAC played a critical role in collective defense. The first victim shared IOCs within hours of detection—before their incident was even contained. H-ISAC distributed the intelligence immediately with TLP:AMBER designation. Within 24 hours, five member organizations reported blocking the same attack at perimeter based on shared IOCs. Two organizations discovered they had already been targeted but hadn't detected it—the shared intelligence enabled them to contain active compromises. Post-incident analysis estimated the sharing prevented $50M+ in collective damages. The first victim's willingness to share during active incident—despite the discomfort—protected the entire sector.

Case Study: Trust Network in Action

A CISO discovered unusual activity suggesting possible nation-state compromise. Before engaging formal channels, they reached out to trusted peers via Signal: "Anyone else seeing [specific pattern]?" Within an hour, three peers confirmed similar activity in their environments. This informal sharing achieved two things: confirmed the activity wasn't unique (reducing likelihood of false positive) and enabled coordinated response. The group collectively engaged CISA, providing correlated intelligence that led to a joint advisory within a week. The informal trust network enabled faster response than any formal channel could have achieved.

Sharing Community Quick Reference:

Getting Started with Sharing:

IMMEDIATE ACTIONS:
□ Join your sector ISAC
□ Register for CISA AIS
□ Join InfraGard (if in US)
□ Follow security researchers on Twitter/X
□ Subscribe to government alerts

BUILD RELATIONSHIPS:
□ Attend sector conferences
□ Participate in ISAC calls/meetings
□ Join regional security groups
□ Connect with peers at similar organizations
□ Engage with vendor communities

ESTABLISH PROCESSES:
□ Create sharing policy
□ Define approval workflow
□ Implement TIP for intelligence management
□ Build sharing into incident response
□ Track contributions and consumption

RESOURCE LINKS:
- National Council of ISACs: nationalisacs.org
- CISA AIS: cisa.gov/ais
- InfraGard: infragard.org
- MISP Project: misp-project.org
- OASIS STIX/TAXII: oasis-open.github.io/cti-documentation

Intelligence sharing transforms individual defense into collective security. The investment in relationships and processes pays dividends when threats emerge.

Guided Lab: Intelligence Sharing Exercise

In this lab, you'll practice creating shareable intelligence products and participate in simulated sharing.

Lab Environment:

  • MISP instance (local or cloud)
  • Sample incident data
  • STIX templates
  • Sharing templates

Exercise Steps:

  1. Review sample incident data
  2. Identify shareable intelligence
  3. Remove/anonymize sensitive information
  4. Create STIX-formatted indicators
  5. Apply appropriate TLP designation
  6. Add context and recommendations
  7. Enter into MISP as event
  8. Simulate sharing to partner
  9. Receive and process partner's shared intelligence

Reflection Questions:

  • What was hardest to anonymize while keeping value?
  • How did you decide on TLP designation?
  • What context was most important to include?

Week Outcome Check

By the end of this week, you should be able to:

  • Describe the threat intelligence sharing ecosystem
  • Explain ISAC/ISAO roles and value
  • Apply Traffic Light Protocol correctly
  • Navigate legal considerations for sharing
  • Use STIX/TAXII for automated sharing
  • Create quality, shareable intelligence products
  • Build and maintain sharing relationships
  • Measure sharing program effectiveness

🎯 Hands-On Labs (Free & Essential)

Practice building shareable intelligence before moving to reading resources.

🧭 OpenCTI Demo: Create a Shareable Report

What you'll do: Build a short report with TTPs, IOCs, and relationships.
Why it matters: Structured intel is easier to share and operationalize.
Time estimate: 90-120 minutes

Open OpenCTI Demo →

🧩 MISP: Create a TLP-Labeled Event

What you'll do: Build an event with indicators, context, and TLP tags.
Why it matters: MISP is a common sharing platform in the field.
Time estimate: 2-3 hours

Open MISP Project →

📝 Lab Exercise: TLP + Sanitization Drill

Task: Redact sensitive details from a mock incident and assign TLP.
Why it matters: Safe sharing protects partners and your organization.
Time estimate: 60-90 minutes

🧩 Lab: Supply Chain STIX Bundle

What you'll do: Build a STIX bundle for a vendor compromise scenario.
Why it matters: Supply chain intel must be shareable and actionable.
Time estimate: 60-90 minutes

💡 Lab Tip: Add enough context to act, but never expose victim-identifying data.

🧩 Supply Chain Intelligence Sharing

Vendor compromises affect entire ecosystems. Sharing needs to balance transparency, legal concerns, and actionability.

Sharing focus:
- Include affected versions and hashes
- Provide mitigation guidance
- Use TLP for safe distribution
- Coordinate with ISACs and vendors

📚 Building on CSY101 Week-14: Align disclosure with governance and compliance expectations.

Resources

Lab

Complete the following lab exercises to practice intelligence sharing skills.

Part 1: STIX Creation (LO4)

Create a STIX 2.1 bundle from incident data: (a) indicator objects for IOCs, (b) malware object, (c) attack-pattern objects mapped to ATT&CK, (d) relationship objects linking them together.

Deliverable: Valid STIX 2.1 JSON bundle with all required objects and relationships.

Part 2: TLP Application (LO8)

Given 10 pieces of intelligence, assign appropriate TLP designations: (a) justify each designation, (b) identify what would need to change to downgrade TLP, (c) describe handling requirements for each level.

Deliverable: TLP assignment document with rationale for each decision.

Part 3: Anonymization Exercise (LO8)

Take a detailed incident report and prepare it for external sharing: (a) identify all sensitive elements, (b) anonymize or remove appropriately, (c) ensure intelligence value is preserved, (d) document what was removed and why.

Deliverable: Anonymized report with documentation of redaction decisions.

Part 4: MISP Event Creation (LO4)

Create a complete MISP event from incident data: (a) event with appropriate metadata, (b) attributes for all indicators, (c) objects for structured data, (d) tags for classification, (e) sharing group configuration.

Deliverable: MISP event export with all components properly configured.

Part 5: Sharing Program Proposal (LO8)

Develop a sharing program proposal for an organization: (a) sharing policy, (b) community memberships recommended, (c) technical implementation plan, (d) metrics for success, (e) resource requirements.

Deliverable: Complete sharing program proposal suitable for executive approval.

Week 11 Quiz

Test your understanding of Strategic Intelligence and Sharing.

Format: 10 multiple-choice questions. Passing score: 70%. Time: Untimed.

Take Quiz

Checkpoint Questions

  1. What are ISACs and ISAOs? How do they differ and what value do they provide to member organizations?
  2. Explain the Traffic Light Protocol. When would you use each level (CLEAR, GREEN, AMBER, RED)?
  3. What legal protections exist for threat intelligence sharing in the US? What requirements must be met?
  4. What is STIX and TAXII? How do they work together to enable automated sharing?
  5. What makes intelligence "shareable"? What should be included for maximum value to recipients?
  6. How would you measure the value of a sharing program? What metrics would you track?

Weekly Reflection

Intelligence sharing transforms isolated defenders into a connected community. This week explored how to participate effectively in the sharing ecosystem.

Reflect on the following in 200-300 words:

A strong reflection demonstrates understanding of sharing as strategic investment in collective defense, with awareness of trust, legal, and quality considerations.

Verified Resources & Videos

← Previous: Week 10 Next: Week 12 →