Today we often struggle to articulate how difficult it is to compromise a given system in some way. Wouldn’t it be good if we had a common vocabulary so that these issues could be discussed, knowing that you were being understood?
Lack of understanding
Many people find it difficult to differentiate between a vulnerability in their systems which is exploitable by anyone who downloads a free online tool, and one which is likely to require months of effort from a dedicated team of super-skilled attackers. Wouldn’t it be useful for the NCSC (and the cyber security community more widely) if we could adopt a common language to describe both the sophistication required for a particular attack, and the sophistication shown by a given threat actor*.
The de-facto standard
At least one de-facto standard is emerging already: STIX (Structured Threat Information eXpression). This is a language developed for cyber threat intelligence sharing. The version 2.0 draft (in section 6.11) defines Threat Actor Sophistication in 7 levels, from None (‘Can carry out random acts of disruption or destruction by running tools they do not understand’), all the way through Minimal, Intermediate, Advanced, Expert, and Innovator, to Strategic (‘State actors who create vulnerabilities through an active program to influence commercial products and services during design, development or manufacturing, or with the ability to impact products while in the supply chain to enable exploitation of networks and systems of interest’).
Why is a common vocabulary useful?
The argument boils down to precision and understanding. With a set of agreed terms we can have more meaningful discussions about security. This will enable us to more closely match our defensive efforts to expected threat levels. I’ve outlined eight situations which would clearly benefit from a common vocab. You might be able to think of more.
1. Risk appetite
Any organisation can use these terms to contribute to cyber security risk appetite. For example:
- ‘We want to ensure that customer data is secure from an Advanced level attack.’
- ‘We want to be able to defend our operational systems from Intermediate level attacks but need to be able to detect Advanced and recover from Expert level.’
2. Is it secure?
We can move away from the vagueness of questions like ‘Is it secure?’, and instead ask, ‘Is it secure against attacks requiring an Intermediate level of capability?’
3.Setting priorities
The ability to give a clear picture of threats and defences, will aid dialog about priorities with senior stakeholders. For example, in government, should we direct our limited cyber security resources towards ensuring that all government departments cannot be compromised by mere Intermediate level attacks, or ensuring that a smaller number of government systems can defend against Expert level?
4. Statistics
Concrete definitions of capability levels mean we can estimate how many people worldwide fit into each category. We can use these figures to support a narrative with our customers and stakeholders. For example, ‘Do you realise that any of the 1.6 million people globally that we estimate are of Intermediate capability could compromise your system?’ (that figure is made up). This seems more likely to drive the point home than ‘we found a vulnerability in your system’.
5. System comparison
We could use it to compare one organisation or system against another. ‘We think that Hogwarts would stand up against Advanced attacks, but Mordor’s HR system could be compromised by them.’ This would also allow us to set national strategies about the ability for specific types of organisations to defend against particular levels of attack.
6. Threats change over time
We could use this common vocabulary to compare attacks and levels of capability over time. For example: Stuxnet at the time it was discovered = Innovator. Stuxnet today = Advanced. Stuxnet next year = Intermediate?
7. Effective practice
We could create exercising scenarios which replicate attacks of a specific capability level.
8. Smart choices
We could start to generate statistics to enable us to make data-driven decisions in future:
- Tag incidents (this one used Advanced capability)
- Tag pen-test reports (report concludes that the system could be compromised by an Intermediate level attack or above)
- Tag designs (this one should be suitable to defend against Advanced attacks as along as the system is well maintained)
Challenges
Assigning levels to specific attackers is difficult, especially for the most capable. The level assigned to an attacker represents the maximum capability they are currently judged to have. Threat actors will often use the easiest route they can to achieve their objectives, and will avoid deploying their most valuable capabilities unless truly necessary. They may therefore use tactics, techniques and procedures that may be used by much lower capability actors, including exploiting commonly known vulnerabilities and using publicly available tools. Some attackers may be extremely capable in one area (for example attacks against financial infrastructure), but far less capable in another (attacks against power infrastructure).
Experience so far
For some time now, I’ve been trialling the use of this STIX scale with a range of the NCSC’s critical national infrastructure (CNI) clients. So far, they’ve all chosen to adopt it in some way internally, enjoying many of the advantages outlined above. Sometimes the organisations have cut down the number of points on the scale to suit their situation, feeling seven was too granular for their needs. The downside to this is that we lose the ability to easily compare between organisations.
What next?
There have been similar scales described in the past, and used for a range of purposes. There’s not much new stuff here in that sense. The real benefits that a common scale could bring to cyber security won’t be felt until we have widespread adoption. Using the same scale to describe both the maximum capability of a given attacker, and the measures required to detect, defend or recover from such an attacker will lead to more meaningful and nuanced discussions about cyber security.
I’d be very pleased to hear any thoughts. I’m particularly keen to hear of any prior work which has been done in this area. You may have an opinion on whether STIX is the right vocabulary to use. And, looking further ahead, once we choose a vocabulary, where are the most important places to start using it? As usual, feel free to use the comments below or contact us directly.
Mat P
CTO for Private Sector Critical National Infrastructure
*‘Threat actor‘ is the cyber security term used to describe a person or group who would seek to do harm. For example, nation state, hacktivist, terrorist group, bored person with too much free-time and a grudge.
Source: National Cyber Security Centre