Skip to content

Commit 47348c9

Browse files
Update threat-intelligence.md
1 parent 2d1d3cb commit 47348c9

File tree

1 file changed

+0
-14
lines changed

1 file changed

+0
-14
lines changed

docs/production/threat-intelligence.md

Lines changed: 0 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -54,19 +54,12 @@ When determining the priority of intelligence collection, there are several key
5454

5555

5656

57-
58-
![Operationalizing Threat Intelligence A guide to developing and operationalizing cyber threat intelligence programs](../../../assets/images/pcr.png)
59-
60-
6157
## The collection operations life cycle
6258

6359
Effective intelligence-gathering requires careful planning, taking into account established collection priorities, special requests for information (RFIs), and regular administration of collection operations. Proper planning ensures that data is collected in a way that aligns with the organization's intelligence-gathering needs.
6460

6561

6662

67-
![Operationalizing Threat Intelligence A guide to developing and operationalizing cyber threat intelligence programs](../../../assets/images/collection.png)
68-
69-
7063
### People
7164

7265
To meet the organization's needs, it is important to have a defined Priority Collection Requirement (PCR) and assess whether the organization has the right personnel to execute the collection. Personnel evaluation in this context can be divided into three categories: technical skills, language proficiency, and subject matter expertise (SME) focus area. These categories help the collection manager determine if the personnel have the necessary qualifications for effective collection.
@@ -126,7 +119,6 @@ After ensuring the availability of suitable personnel and conducting thorough pl
126119

127120
## Lockheed's Martin Cyber Kill Chain
128121

129-
![Lockheed's Martin Cyber Kill Chain](../../../assets/images/lock_kill.png)
130122

131123
### Reconnaissance:
132124

@@ -204,8 +196,6 @@ After ensuring the availability of suitable personnel and conducting thorough pl
204196

205197
## DevOps Threat Matrix
206198

207-
![Microsoft DevOps Threat](../../../assets/images/microsoft_devops_threat.png)
208-
209199
A DevOps Threat Matrix is a comprehensive framework or resource that identifies and categorizes potential security threats and risks associated with implementing DevOps practices. It aims to provide organizations with insights into the security challenges they may encounter while adopting a DevOps approach and offers guidance on mitigating these risks.
210200

211201
The Microsoft Security Blog, which you mentioned, likely provides detailed information on their DevOps Threat Matrix. It may cover different threat categories such as:
@@ -691,8 +681,6 @@ In this scenario, the attacker exploits their access to the CI/CD pipelines, whi
691681

692682
## Kubernetes Threat Matrix
693683

694-
![Microsoft Kubernetes Threat Threat](../../../assets/images/k8s-matrix.png)
695-
696684

697685
The Threat Matrix highlights various attack techniques, including both known and hypothetical scenarios, that could be exploited by adversaries targeting Kubernetes environments. It categorizes these techniques into different stages of the attack lifecycle, such as initial access, privilege escalation, lateral movement, persistence, and exfiltration.
698686

@@ -1189,8 +1177,6 @@ Attackers may launch DoS attacks to disrupt the availability of Kubernetes servi
11891177

11901178
## Cloud Threat Matrix
11911179

1192-
![MITRE ATT&CK Cloud Threat Matrix](../../../assets/images/cloud-matrix.png)
1193-
11941180
The MITRE ATT&CK framework provides a comprehensive knowledge base of adversary tactics and techniques used in cyber attacks.
11951181

11961182
### Initial Access:

0 commit comments

Comments
 (0)