Chapter 3: Carrying out Adversary Emulation with CTI
In this chapter, we will introduce cyber threat intelligence (CTI). We will learn the different types of intelligence applicable to various cybersecurity threats and identify a range of use cases for CTI. We will also learn how CTI can help us describe a cyberattack, how indicators of compromise (IoCs) should be leveraged, and how everything fits together in the CTI process.
Once we have introduced CTI, we will see how it can be leveraged to provide input for purple teaming assessments to help organizations focus on relevant threats only, thereby prioritizing and maximizing cyber defense efforts.
In this chapter, we will cover the following main topics:
- Introducing CTI
- The CTI process
- The types of CTI and their use cases
- CTI terminology and key models
- Integrating CTI with purple teaming