Skip to main content

Threat-informed defence is a cybersecurity strategy that aligns defence measures with the tactics, techniques, and procedures (TTPs) used by adversaries. It aims to proactively enhance an organisation’s security posture by understanding and anticipating potential threats. This article tells you all you need to know about threat-informed defence.

Core principles

Threat-informed defence is grounded in the idea that real-world intelligence about threats must shape effective security measures.

Its core principles include:

  1. Adversary emulation: Mimicking known attacker behaviours to test and improve defences.
  2. Prioritisation of efforts: Focusing resources on the most relevant threats based on the organisation’s risk profile.
  3. Continuous improvement: Evolving defences in response to new threats and vulnerabilities.
  4. Evidence-based strategy: Using threat intelligence, incident reports, and frameworks to make informed decisions.

Threat-informed versus threat-based

Aspect Threat-informed Threat-based
Definition Relies on a holistic understanding of threats, considering context, intent, and capability of adversaries. Focuses primarily on known, immediate, or specific threats.
Scope Broad and strategic, encompassing emerging, potential, and future threats. Narrow and tactical, addressing identified and active threats.
Focus Prioritises proactive measures and resilience to unknown or evolving threats. Emphasises reactive measures to mitigate or eliminate current threats.
Data sources Integrates diverse data sources: threat intelligence, historical trends, and risk analysis. Uses direct threat intelligence from incidents, reports, and specific vulnerabilities.
Time horizon Long-term focus, addressing both current and speculative risks. Short-term focus on addressing immediate or near-term risks.
Examples 1. Considering geopolitical risks in cybersecurity strategy.
2. Preparing for AI-driven phishing attacks.
1. Patching a vulnerability after a specific malware outbreak.
2. Responding to a phishing campaign targeting employees.
Approach to mitigation Builds layered defences, fosters adaptability, and anticipates unknown threats. Implements targeted fixes or countermeasures for known issues.
Flexibility Highly flexible and adaptive to changing threat landscapes. Relatively rigid, tied to the specifics of known threats.
Outcome Enhances organisational resilience and strategic foresight. Minimises the impact of immediate threats and vulnerabilities.

Key components

Threat intelligence

  • Collecting, analysing, and operationalising data about current and emerging threats.
  • Sources: Open-source feeds, commercial vendors, government alerts, and internal telemetry.

Frameworks and methodologies

  • MITRE ATT&CK Framework: A comprehensive knowledge base of adversary TTPs mapped to attack phases.
  • Cyber kill chain (Lockheed Martin): A model outlining stages of an attack, from reconnaissance to execution.
  • Diamond model of intrusion analysis: Emphasises understanding relationships between adversaries, infrastructure, and victims.

Adversary emulation

  • Tools like MITRE Caldera, Atomic Red Team, and Cobalt Strike simulate real-world attacks for testing defences.
  • Red teaming exercises mimic advanced persistent threats (APTs) to test resilience.

Defensive alignment

  • Utilising data from threat intelligence and frameworks to optimise controls, detection, and incident response.
  • Focus on detection gaps, response capabilities, and resilience planning.

Automation and machine learning

  • Automating threat detection and response using SIEM (Security Information and Event Management) systems and SOAR (Security Orchestration, Automation, and Response).
  • Leveraging machine learning to detect anomalies and unknown threats.

Benefits versus challenges

Threat-informed defence offers significant benefits for organisations striving to enhance their cybersecurity posture. By leveraging threat intelligence, organisations gain actionable insights into adversary tactics, techniques, and procedures (TTPs), enabling them to prioritise security measures based on real-world threats. This approach enhances proactive risk management, ensuring resources are allocated where they are most needed. Threat-informed defence also fosters a deeper understanding of evolving cyber threats, helping organisations build resilience and agility in the face of sophisticated adversaries. Furthermore, this strategy facilitates collaboration and information sharing across industries, strengthening collective defence efforts and improving the overall cybersecurity ecosystem.

However, implementing a threat-informed defence strategy is not without challenges. One of the primary hurdles is the complexity of gathering, analysing, and operationalising threat intelligence effectively. Organisations often face a deluge of data, making it difficult to filter relevant and actionable information from noise. Another challenge is the lack of skilled personnel with expertise in threat intelligence and incident response, which can hinder the ability to act on insights promptly. Additionally, integrating threat intelligence into existing security frameworks may require significant investment in tools, technologies, and processes, which could strain budgets and resources. Lastly, ensuring the accuracy, timeliness, and reliability of threat intelligence remains a persistent issue, as outdated or incorrect information can lead to misaligned defences and wasted efforts.

Despite these challenges, the adoption of threat-informed defence can provide a strategic edge in combating modern cyber threats when approached with the right tools, expertise, and collaborative efforts.

Threat-informed defence lifecycle

Stage 1: Threat landscape assessment

  • Understand which adversaries are likely to target your industry and why.
  • Prioritise based on industry reports, such as Verizon’s DBIR or Mandiant’s M-Trends.

Stage 2: Threat modelling

  • Identify assets, attack paths, and weaknesses.
  • Use frameworks like STRIDE (Microsoft) or PASTA (Process for Attack Simulation and Threat Analysis).

Stage 3: Implementation

  • Align detection and response tools with mapped TTPs.
  • Integrate adversary emulation exercises into routine testing.

Stage 4: Measurement

  • Use metrics like dwell time, detection rate, and incident resolution time.
  • Adopt purple teaming exercises to continuously evaluate both offensive and defensive capabilities.

Stage 5: Feedback loop

  • Integrate learnings from incidents and exercises into the threat intelligence process.
  • Regularly update tools, frameworks, and defences.

Tools and platforms

  1. Threat Intelligence Platforms (TIPs): Recorded Future, Anomali, MISP.
  2. Threat emulation tools: MITRE Caldera, Atomic Red Team, Red Canary.
  3. Detection & response: Splunk, SentinelOne, CrowdStrike Falcon.
  4. Vulnerability management: Tenable Nessus, Rapid7, Qualys.

Industries and use cases

Financial services

  • Addressing advanced cybercrime (e.g., APT38 targeting SWIFT).
  • Defending against fraud and insider threats.

Energy and utilities

  • Combatting threats to SCADA/ICS systems.
  • Resilience against state-sponsored attacks (e.g., Triton malware).

Healthcare

  • Protecting sensitive patient data from ransomware and espionage.
  • Ensuring compliance with HIPAA and GDPR.

Public sector

  • Safeguarding critical infrastructure.
  • Combatting disinformation and election interference.

Future trends

AI and machine learning in threat detection

Use of AI to predict adversary behaviour and automate threat responses.

Collaboration between organisations

Sharing threat intelligence through platforms like ISACs (Information Sharing and Analysis Centres).

Focus on Zero Trust Architecture

Aligning threat-informed defence with principles of identity verification, least privilege, and micro-segmentation.

Supply chain security

Addressing risks from third-party vendors and partners.

Legal considerations

Category Legal consideration Relevant law or standard
Data protection & privacy Ensure data collection during threat monitoring complies with privacy laws (e.g., avoiding excessive data collection). GDPR, POPIA, CCPA, etc.
Verify data subject rights, such as access and rectification, are not violated during defensive actions. GDPR (Articles 15-22), POPIA
Confirm cross-border data transfers are lawful, particularly when using threat intelligence platforms hosted outside the region. GDPR (Chapter V), POPIA (Section 72)
Cybersecurity obligations Meet statutory and contractual cybersecurity obligations for protecting personal or sensitive data during defence activities. NIS Directive, SOC 2, ISO 27001
Follow any mandated disclosure obligations in case of breaches identified during threat analysis. GDPR (Articles 33-34), HIPAA
Intellectual property Ensure proprietary threat intelligence tools or data feeds do not infringe third-party intellectual property rights. Copyright Act, IP Licensing Agreements
Protect proprietary algorithms, processes, or insights from misappropriation by third parties. Trade Secrets Laws, NDA/Confidentiality Clauses
Use of offensive tactics Avoid unauthorised access or “hacking back”, which may breach anti-hacking laws even when responding to a threat. Computer Misuse Act (UK), CFAA (US), Cybercrimes Act (SA)
Ensure honeypots, deception technologies, or active defence measures comply with national cybersecurity laws. Local Cybercrime Laws
Contractual relationships Review vendor contracts to ensure clear roles and responsibilities regarding threat monitoring and response, including indemnities for breaches. Master Service Agreements (MSAs), SLAs
Verify third-party vendors adhere to appropriate threat intelligence sharing standards. ISO/IEC 27036-2, FS-ISAC Agreements
Liability concerns Assess potential liability for harm caused by false positives in threat intelligence shared with third parties. Civil Liability Laws, Defamation Laws
Define liability caps for failures in defensive tools or systems leading to data breaches. Contractual Liability Clauses
Regulatory compliance Align defensive measures with sector-specific regulations (e.g., banking, healthcare). PCI DSS, HIPAA, Basel III, etc.
Engage with regulators when leveraging threat intelligence to influence compliance reporting. FSB Cyber Resilience Guidelines, GDPR Accountability
Ethics in threat sharing Ensure ethical considerations in sharing intelligence, such as avoiding disproportionate harm to non-malicious actors. ISAO Standards, Organisational Ethics Policies
Balance transparency with confidentiality in shared threat data. NDAs, Data Sharing Agreements
Cross-border jurisdiction Address jurisdictional issues when engaging in global threat intelligence sharing or defence actions. Conflict of Laws, International Treaties
Ensure compliance with bilateral agreements and treaties for cross-border data sharing. CLOUD Act, Budapest Convention
Incident response Ensure incident response plans comply with mandatory notification and reporting requirements. GDPR (Article 33), NIS Directive
Avoid potential legal liability for unintentional damage during containment activities (e.g., impacting third-party networks). Civil and Criminal Laws
Human rights Verify that actions taken during defence (e.g., monitoring employee communications) respect fundamental rights to privacy and freedom of expression. UN Guiding Principles, ECHR (Articles 8 & 10)
Insurance Validate coverage under cyber liability insurance for defensive actions (e.g., active threat hunting). Cyber Insurance Policies, Policy Exclusions

How ITLawCo can help

ITLawCo specialises in aligning legal, IT, and policy considerations to fortify your organisation’s threat-informed defence strategy. Here’s how we can assist:

  1. Cybersecurity governance frameworks: We design governance structures aligned with industry frameworks like MITRE ATT&CK and ISO 27001 to ensure compliance and resilience.
  2. Incident response planning: We craft bespoke incident response strategies, ensuring your organisation is prepared to handle breaches swiftly and effectively.
  3. Threat risk assessments: ITLawCo evaluates your existing infrastructure to identify gaps in your defence posture, focusing on adversary-specific TTPs.
  4. Policy development: From AI governance to third-party risk management, we draft policies that align with threat-informed principles.
  5. Training and workshops: We provide tailored workshops for your teams to understand and implement threat-informed practices, leveraging behavioural insights for maximum impact.
  6. Regulatory compliance: Our team ensures your threat-informed defence aligns with laws like POPIA, GDPR, and sector-specific cybersecurity regulations.
  7. Cybersecurity strategy for public sector: With expertise in advising governments and public sector organisations, we help strengthen their digital ecosystems against adversarial threats.

By partnering with ITLawCo, your organisation can move beyond traditional security measures to adopt a proactive, legally compliant, and highly effective defence strategy tailored to your unique threat landscape. Contact us today.