Threat modeling methods and frameworks
Often, individuals and organizations find that threat modeling uses visualizations and that threat frameworks help to identify the threat actors' capabilities, motivations, and goals. This practice has been known to drive software and product improvements, harden security postures, and even drive threat intelligence requirements as part of the cyclical nature of constant evaluation. The purpose of utilizing these methods and frameworks is to train the hunters, researchers, and analysts who are looking at the intelligence collection to have a mindset that considers how the adversary will compromise a system. These modeling methods and frameworks discussed are meant to be repeatable and, at times, benefit from security automation to aid the organization. Let's examine some that are popular within the CTI industry.
Threat intelligence pyramid of pain
In Chapter 3, Guidance and Policies, when we discussed General Intelligence Requirements...