OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

cti-stix message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]


Subject: Re: [cti-stix] Asset TLO discussion


Infrastructure behind my walls or running in a cloud provider provisioned by me is an asset. That asset may be behaving in a malicious manner or not, however, infrastructure out on the internet or at a third party, is not an asset. Unless you are saying it is an asset of the threat actor?

It seems confusing to call malicious hosts out on the web "assets". If we're going to use the term this way, I would lean more toward calling the object a more neutral term like "infrastructure" or "system", and not "asset".

-
Jason Keirstead
STSM, Product Architect, Security Intelligence, IBM Security Systems
www.ibm.com/security | www.securityintelligence.com

Without data, all you are is just another person with an opinion - Unknown


Inactive hide details for "Jordan, Bret" ---06/23/2016 02:41:42 PM---I mostly agree with Allan here...  But I do think there is"Jordan, Bret" ---06/23/2016 02:41:42 PM---I mostly agree with Allan here... But I do think there is a potential option for a Malicious_Infras

From: "Jordan, Bret" <bret.jordan@bluecoat.com>
To: Allan Thomson <athomson@lookingglasscyber.com>
Cc: "Wunder, John A." <jwunder@mitre.org>, "cti-stix@lists.oasis-open.org" <cti-stix@lists.oasis-open.org>
Date: 06/23/2016 02:41 PM
Subject: Re: [cti-stix] Asset TLO discussion
Sent by: <cti-stix@lists.oasis-open.org>





I mostly agree with Allan here... But I do think there is a potential option for a Malicious_Infrastructure object that contains a bunch of Assets... So while an Asset could be linked directly to a threat actor, it may be linked first to a Malicious_Infrastructure and then that Malicious_Infrastructure could be linked to the Threat Actor.


Thanks,

Bret



Bret Jordan CISSP
Director of Security Architecture and Standards | Office of the CTO
Blue Coat Systems
PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050
"Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."
[attachment "signature.asc" deleted by Jason Keirstead/CanEast/IBM]




[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]