CMMC SA.4.173 - Design Capabilities to Leverage Indicators of Compromise

CMMC SA.4.173 - Design Capabilities to Leverage Indicators of Compromise

Requirement text: SA.4.173: Design network and system security capabilities to leverage, integrate, and
share indicators of compromise.

DISCUSSION FROM SOURCE: CMMC
Sharing IoCs (Indicators of Compromise) to systems across an enterprise strengthens an
organization’s ability to thwart adversaries. Designing an organization’s security
architecture to integrate and share IoCs rapidly increases the likelihood of stopping an attack
that is happening at machine speed. Machine speed attacks are attacks that are happening in
real-time and use automation to increase the speed at which the attack spreads and performs
actions. Effective sharing requires that intelligence services as well as internal resources
process IoC information and provide it to the necessary systems in order to act on the
information quickly.

CMMC CLARIFICATION
Most cyber-defense solutions provide an API (Application Programming Interface) that
allows an organization to automate updates to solutions for IoC blocking, hunting, or other
mitigation. By automating the process, the organization will remove the likelihood of a
human mistyping an entry, and it greatly reduces the time for insertion into the security
solution as compared to manual entry.

Example 1
Your organization uses a cyber intelligence service and as information comes in, bad
domains are provided that an organization would not want their assets visiting. Once
received, the information is pushed to the corporate firewall, proxy server, and DNS services
for blocking, and reducing the gap between receiving the information and the time it takes
to block any access to the bad domains. This stops users from accessing potentially malicious
files from the domains provided.

Example 2
The organization receives information that a specific attack probe is being launched from a
foreign system. The threat report identifies the country codes and IP structure for the attack
machines. Your intelligence processing solution collects this information and then adds the
IP addresses to the block list of your corporate firewall. Within ten minutes after the
automated process updated the firewall you receive logs of the attempts against the
corporate website. The logs show the attempt but the details show the attempts were
blocked. All of this took place without human intervention and prevented the attack from
being successful.

References
• CMMC
• NIST SP 800-53 Rev 4 SI-4(24)
    • Related Articles

    • CMMC SA.4.171 - Implement Cyber-Threat Hunting

      Requirement text: SA.4.171: Establish and maintain a cyber-threat hunting capability to search for indicators of compromise in organizational systems and detect, track, and disrupt threats that evade existing controls. DISCUSSION FROM SOURCE: DRAFT ...
    • CMMC SC.3.180 - Employ Security Architecture and Design and to Promote Effective Security

      Requirement text: SC.3.180: Employ architectural designs, software development techniques, and systems engineering principles that promote effective information security within organizational systems. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 ...
    • CMMC SA.3.169 - Use Cyber Threat Intelligence

      Requirement text: SA.3.169: Receive and respond to cyber threat intelligence from information sharing forums and sources and communicate to stakeholders. DISCUSSION FROM SOURCE: CMMC Establish relationships with external organizations to gather cyber ...
    • CMMC CA.4.163 - Leverage Security Roadmap for Improvement

      Requirement text: CA.4.163: Create, maintain, and leverage a security roadmap for improvement. DISCUSSION FROM SOURCE: CMMC As organizations become more mature in their cyber security operations, it is expected that an organization will create, ...
    • CMMC RM.4.150 - Employ Threat Intelligence

      Requirement text: RM.4.150: Employ threat intelligence to inform the development of the system and security architectures, selection of security solutions, monitoring, threat hunting, and response and recovery activities. DISCUSSION FROM SOURCE: ...