You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/production/threat-intelligence.md
-14Lines changed: 0 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,19 +54,12 @@ When determining the priority of intelligence collection, there are several key
54
54
55
55
56
56
57
-
58
-

59
-
60
-
61
57
## The collection operations life cycle
62
58
63
59
Effective intelligence-gathering requires careful planning, taking into account established collection priorities, special requests for information (RFIs), and regular administration of collection operations. Proper planning ensures that data is collected in a way that aligns with the organization's intelligence-gathering needs.
64
60
65
61
66
62
67
-

68
-
69
-
70
63
### People
71
64
72
65
To meet the organization's needs, it is important to have a defined Priority Collection Requirement (PCR) and assess whether the organization has the right personnel to execute the collection. Personnel evaluation in this context can be divided into three categories: technical skills, language proficiency, and subject matter expertise (SME) focus area. These categories help the collection manager determine if the personnel have the necessary qualifications for effective collection.
@@ -126,7 +119,6 @@ After ensuring the availability of suitable personnel and conducting thorough pl
126
119
127
120
## Lockheed's Martin Cyber Kill Chain
128
121
129
-

130
122
131
123
### Reconnaissance:
132
124
@@ -204,8 +196,6 @@ After ensuring the availability of suitable personnel and conducting thorough pl
A DevOps Threat Matrix is a comprehensive framework or resource that identifies and categorizes potential security threats and risks associated with implementing DevOps practices. It aims to provide organizations with insights into the security challenges they may encounter while adopting a DevOps approach and offers guidance on mitigating these risks.
210
200
211
201
The Microsoft Security Blog, which you mentioned, likely provides detailed information on their DevOps Threat Matrix. It may cover different threat categories such as:
@@ -691,8 +681,6 @@ In this scenario, the attacker exploits their access to the CI/CD pipelines, whi
The Threat Matrix highlights various attack techniques, including both known and hypothetical scenarios, that could be exploited by adversaries targeting Kubernetes environments. It categorizes these techniques into different stages of the attack lifecycle, such as initial access, privilege escalation, lateral movement, persistence, and exfiltration.
698
686
@@ -1189,8 +1177,6 @@ Attackers may launch DoS attacks to disrupt the availability of Kubernetes servi
0 commit comments