Table 3 Definitions, audiences, purposes, scopes, and examples for four cyber threat intelligence types: strategic, operational, tactical, and technical. Abbreviations: TTPs, tactics-techniques-procedures; IoCs, indicators of compromise.

From: Proactive identification of cybersecurity compromises via the PROID compromise assessment framework

 

Strategic Threat Intelligence

Operational Threat Intelligence

Tactical Threat Intelligence

Technical Threat Intelligence

Definition

high-level information about relative threats’ trends, attributions, and motivations

Information about the specifics of possible, impending, or ongoing attacks against the organization

Provides detailed information on the tactics, techniques, and procedures (TTPs) of adversaries

Involves technical indicators of compromise (IoCs) such as malware signatures, IP addresses, URLs, and hash values associated with adversaries activities

Audience

organizational leaders and decision makers

higher-level security staff and incident response managers

Technical teams such as SOC analysts and incident response team

Technical teams such as SOC analysts and incident response team, in addition to relative IT staff responsible for the technical aspects of network

Purpose

Provide broad long-term understanding of the threat landscape

To prepare for, identify, or respond to specific threats by understanding the operational details of attacks

To guide the selection and implementation of security controls and defensive measures based on adversaries’ known TTPs

To detect and respond to immediate threats with specific technical indicators

Scope

Broad and generalized, offering a macro view of threat trends, industrial and geopolitical factors

Detailed information about specific threats or campaigns targeting the organization

Narrower in focus, concentrating on the immediate TTPs of adversaries

Highly specific, dealing with the technical details of threats and indicators used to identify them

Example

Intelligence about an APT’s attribution, motive, and why it targeting specific industry or geographical region

Details of a targeted phishing campaign against the organization, including the timeline and tactics used

Specific malware techniques such as spear-phishing or ransomware tactics used by adversaries

Hash values of malware files, malicious IP addresses, URLs used in phishing attacks