Entity driven hunting

Situational or entity-driven hunting

Situational threat hunting focuses on high-risk/high-value entities such as sensitive data or critical computing resources

  • Its main benefit is that it helps focus and prioritize threat-hunting activity to improve its effectiveness

  • Attackers commonly target specific high-value/high-risk assets such as domain controllers or privileged users as IT administrators and DevOps Managers

  • Threat hunting helps identify these high-priority targets and conduct focused searches for relevant threats

  • A situational hypothesis could come from an enterprise's internal risk assessment or a trends and vulnerabilities analysis unique to your environment

Entity-oriented leads come from crowd-sourced attack data that, when reviewed, reveal the latest TTPs of current cyberthreats

A threat hunter can then search for these specific behaviors within the environment

Crown Jewel Analysis (CJA)

Crown Jewel Analysis determines which systems or assets are critical

Crown jewels are essential to an organization:

  • Provide basic functionality

  • Required for organization's core services/functionality

Identifying crown jewels (CJ)

  • Determine mission objectives before attempting to identify crown jewels

  • Mission objectives represent the processes/services critical to an organization

  • Define crown jewels for different critical functions

Determining dependencies

  • System components may fail if other components fail

  • Component failure relationships are known as dependencies

  • Crown jewels suffer from dependency failures too!

Dependency map

A dependency map shows the qualitative relationship between a crown jewel and its various supporting assets

  • In the event of asset failure, the map will show which failures will degrade the CJ's performance or cause the CJ to fail and which failures can be worked around

Attack graphs

After determining the crown jewels for an organization, consider how they might be attacked (both directly and through their supporting assets)

Example

The domain administrator account is the most powerful account in the domain

It's given domain-wide access and administrative rights to administer the computer and the domain, and it has the most extensive rights and permissions over the domain

Your internal risk assessment indicates that your domain administrator accounts are a concern. This will form the Purpose for a threat hunt

Domain administrator account activity in your environment and the associated logs needed become the Scope of your hunt

The hunter should formulate a plan to conduct the hunt based on the scope like looking for outliers in domain admin account logons

After planning, the hunter should execute the hunt by collecting and analyzing relevant data to determine if any questionable activity is observed the environment

If there is confirmed suspicious activity in the environment, detailed investigation across the attack life cycle must be performed to determine the extent of the threat and response should be handled accordingly

Any lessons from the hunt should be used as feedback to improve the hunting process

Last updated