Chapter 7: Technical Threat Analysis – Enrichment
Collecting data and intelligence is vastly different than analyzing it. While many organizations don't leverage collection in a formalized way, many organizations do perform analysis on cyber threat intelligence and data in some capacity. Data without context is just that – data. However, with proper context and analysis applied, that data can then become intelligence.
In Chapter 1, Why You Need a Threat Program, we explained that the third stage of the intelligence life cycle is analysis. One of the most important phases, the analysis phase, involves exploiting data that is received as part of the collection phase to perform analysis or enrichment on that data, ultimately refining it and establishing value to prepare for the next phase – production. Analysis and enrichment are very closely related, with analysis being a detailed examination of threat intelligence data and enrichment being the act of improving...