Hey there @venkata-ayyala,
My name is Colin Leavy, I work on the Threat and Vulnerability Management Team here at Netskope. Me and my team actually built the CTI program here, so here is a brief rundown for you!
We have a CTI program that utilizes many sources from social media, to OSINT, to Government Agencies like CISA. We utilize an RSS feed with Machine Learning to aggregate and cross check these feeds, and create investigations and escalations from the events driven from there as needed. The primary goal is to identify actively exploited vulnerabilities and active campaigns, and use that knowledge to find likely points of attack for anyone targeting our own company.
For specific references, here are some great places to start
- https://www.cisa.gov/
- USA Cybersecurity and Infrastructure Security Agency
- This agency is responsible for supporting the security of government agencies, but provides guidelines that can support any business. A great resource for any team looking to build out an Intel program
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog
- CISA Actively Exploited CVE List
- CISA maintains a list of actively exploited CVE's, this is a quick reference to what may be applicable in the threat landscape, mapped back to a standardized vulnerability ID allowing easy referencing to other tools
- https://attack.mitre.org/
- MITRE ATT&CK defines a standard for Threat Actor Tactics Techniques and Procedures (TTPs)
- This provides a standardization of attack tactics that can be used across tools
CTI works well in conjunction with other tools such as
- Attack Surface Management (ASM)
- ASM tools give visibility into what assets are externally exposed
- CTI combined with knowledge of your attack surface allows prioritization of the assets most likely to be targeted by attackers
- Attack Breach Simulation (ABS)
- ABS tools allow you to test known exploits, malware, and even Threat Actor TTPs against your security controls
- This gives you confidence your tooling is able to block specific attacks
- News Aggregators
- News Aggregators allow simple consolidation of multiple sources of intelligence
- Could be as simple as an RSS Feed
- MISP ( https://www.misp-project.org/ )
- MISP is an Intelligence Sharing Platform that allows sharing and importing of IoCs
- Effectively a database of known Intelligence that stores IoCs, TTPs, Threat Actors, and a lot more information.
If you have any other questions, feel free to ask!