Skip to content

Commit 7130e36

Browse files
Turn H3s into bullet points + address suggestion
1 parent 392e9fd commit 7130e36

File tree

1 file changed

+12
-36
lines changed
  • src/content/docs/security-center/cloudforce-one

1 file changed

+12
-36
lines changed

src/content/docs/security-center/cloudforce-one/index.mdx

Lines changed: 12 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -41,53 +41,29 @@ To submit RFIs (Request for Information):
4141

4242
The Cloudflare dashboard presents the following request types when you want to configure a Cloudforce One Requests for Information:
4343

44-
### Binary Analysis - IOCs
44+
- **Binary Analysis - IOCs**: Conduct high level malware analysis to produce [indicators](https://www.cloudflare.com/en-gb/learning/security/what-are-indicators-of-compromise/) such as a call-back domain or IP address.
4545

46-
Conduct high level malware analysis to produce indicators such as a call-back domain or IP address.
46+
- **Binary Analysis - Report**: A thorough analysis of a malware sample to produce an attribution assessment and extract the configuration of the sample for further analysis. Useful for customers that are investigating a problem or trying to develop detection logic in an [EDR](https://en.wikipedia.org/wiki/Endpoint_detection_and_response) or network sensor.
4747

48-
### Binary Analysis - Report
48+
- **DDoS Attack**: Confirm if an attack is happening against a specific website to share any available indicators and potential attribution.
4949

50-
A thorough analysis of a malware sample to produce an attribution assessment and extract the configuration of the sample for further analysis. Useful for customers that are investigating a problem or trying to develop detection logic in an [EDR](https://en.wikipedia.org/wiki/Endpoint_detection_and_response) or network sensor.
50+
- **Indicator Analysis - IOCs**: Conduct DNS lookups, origin pivots, and account pivots to provide indicators such as DNS resolutions, origin IPs, and subdomains. Analysis can include account registration patterns and victimology.
5151

52-
### DDoS Attack
52+
- **Indicator Analysis - Report**: A thorough analysis of indicators written in a formal, structured format. In addition to listing [Indicator of compromise (IOCs)](https://www.cloudflare.com/en-gb/learning/security/what-are-indicators-of-compromise/), the report explains how IOCs function within the attack chain, and adds context by linking IOCs to specific campaigns and/or threat actors and their TTPs.
5353

54-
Confirm if an attack is happening against a specific website to share any available indicators and potential attribution.
54+
- **Passive DNS Resolution**: Research the pair of an IP address to the domain it resolved to during a specified period of time.
5555

56-
### Indicator Analysis - IOCs
56+
- **Strategic Threat Research**: Strategic Threat Research goes beyond simple indicators to analyze broader, long-term trends, threat actors, and industries — often supplemented by open-source intelligence to inform high-level management and planning rather than providing immediately actionable intelligence.
5757

58-
Conduct DNS lookups, origin pivots, and account pivots to provide indicators such as DNS resolutions, origin IPs, and subdomains. Analysis can include account registration patterns and victimology.
58+
- **Threat Detection Signature - IOCs**: Develop a rule such as Yara that will detect a sample, behavior, or network observable such as an IP address, domain, file hash, or attribute of a file or HTTP request.
5959

60-
### Indicator Analysis - Report
60+
- **Threat Detection Signature - Report**: A thorough analysis report that investigates the details of a threat detection alert or report for the benefit of customers that are trying to prioritize their response effort or to attribute activity to a threat actor.
6161

62-
A thorough analysis of indicators written in a formal, structured format. In addition to listing [Indicator of compromise (IOCs)](https://www.cloudflare.com/en-gb/learning/security/what-are-indicators-of-compromise/), the report explains how IOCs function within the attack chain, and adds context by linking IOCs to specific campaigns and/or threat actors and their TTPs.
62+
- **Traffic Analysis - IOCs**: Review HTTP telemetry of IOCs in question and provide relevant, sanitized traffic which can include victim country and in some cases victim ASNs. Identify malicious files/payloads, and unusual file paths or request patterns.
6363

64-
### Passive DNS Resolution
64+
- **Traffic Analysis - Report**: Report that analyzes HTTP telemetry to identify patterns, anomalies, and data pointing to malicious behavior. Provides context for observed network behaviors and maps them to known TTPs of specific threat groups.
6565

66-
Research the pair of an IP address to the domain it resolved to during a specified period of time.
67-
68-
### Strategic Threat Research
69-
70-
Strategic Threat Research goes beyond simple indicators to analyze broader, long-term trends, threat actors, and industries — often supplemented by open-source intelligence to inform high-level management and planning rather than providing immediately actionable intelligence.
71-
72-
### Threat Detection Signature - IOCs
73-
74-
Develop a rule such as Yara that will detect a sample, behavior, or network observable such as an IP address, domain, file hash, or attribute of a file or HTTP request.
75-
76-
### Threat Detection Signature - Report
77-
78-
A thorough analysis report that investigates the details of a threat detection alert or report for the benefit of customers that are trying to prioritize their response effort or to attribute activity to a threat actor.
79-
80-
### Traffic Analysis - IOCs
81-
82-
Review HTTP telemetry of IOCs in question and provide relevant, sanitized traffic which can include victim country and in some cases victim ASNs. Identify malicious files/payloads, and unusual file paths or request patterns.
83-
84-
### Traffic Analysis - Report
85-
86-
Report that analyzes HTTP telemetry to identify patterns, anomalies, and data pointing to malicious behavior. Provides context for observed network behaviors and maps them to known TTPs of specific threat groups.
87-
88-
### Vulnerability
89-
90-
Investigation to attribute vulnerability exploitation to a threat actor or investigation of IPs, domains, or threat actor groups exploiting the vulnerability. Response can include relevant, sanitized traffic demonstrating exploitation and identification of victim countries and industries.
66+
- **Vulnerability**: Investigation to attribute vulnerability exploitation to a threat actor or investigation of IPs, domains, or threat actor groups exploiting the vulnerability. Response can include relevant, sanitized traffic demonstrating exploitation and identification of victim countries and industries.
9167

9268
</Details>
9369

0 commit comments

Comments
 (0)