Intelligence Architecture v0 7 42
Intelligence Architecture v0 7 42
1
Simple Brainstorming
6.1.1.1.1.1 1.1.1.1 1.1.1.1.1
Clear Identify ALL of them Exploration Techniques
1.1.1.1.1.2
Cluster Brainstorming
1.1.1.1.1.3
6.1.1.1.1.2
Circle Boarding
Measurable 1.1.1.2.1
Long-Term
6.1.1.1.1.3 6.1.1.1.1
Correlated to Decision(s) Primary (Feedback) 1.1.1.2 1.1.1.2.2
Identify Their Focus Medium-Term
6.1.1.1.1.4
Frictionless 1.1.1.2.3
Short-Term
6.1.1.1.1.5 6.1.1.1
Meaningful Standards 1.1.1.3 1.1.1.3.1
Identify Their Level Strategic
6.1.1.2
6.1.1.1.2.1
Models 1.1.1.3.2
Not only what we can count Operational
6.1.1.3
6.1.1.1.2
6.1.1.1.2.2 Secondary (Metrics) Templates 1.1.1.3.3
Value & Impact not only 1.1.1 Tactical
output 6.1.1.4 Identify Your
Guides 6.1.1
Stakeholders 1.1.1.3.4
6.1.1.1.2.3 Process & Technical 1.1.1.4.1
Aligned 6.1.1.5 Identify Their Power Stakeholders
Procedures or their focus
Policies
Changed?
Risk When
Intel Program Feedback Results Sharing
X.X Management 1.1.4.1.2
6.3.3.8 1.2.2.1.6
6.3.3.9
1.2.2.2.1
IRM Identify Current Skills Availability
System
How did 1.2.2.2.2
6.3.3.10 we do? Identify Future Skills Needed
API
1.2.2 1.2.2.2 1.2.2.2.3
6.3.4.1 1.2.2.2.4
Measure of 1.2.2.3 Prioritize Skills Gap
Available
Performance (MoP) 6.3.4 1.2.2.2.5
Measure 1.2 Fill Skill Gaps
6.3.4.2 Type Resource 1.2.3.1
6.4.1 Intelligence Mgmt
Measure of
Useful? 6.4 Refining existing IRs, Management
Effectiveness 1.2.3.3.1
1.2.3.2 Intelligence
(MoE) 6.4.2 Evaluate developing new ones, Tools & Techniques
1.2.3 Supporting Intel process
6.4.3.1 Constructive? Feedback or re-tasking Technology 1.2.3.3.2
Action Knowledge
6.4.3 1.2.3.3
6.3.5.1 Sharing
Yearly 6.4.3.2 Actionable? 1.2.3.3.3
Inaction Insights
1.2.3.4
6.3.5.2 How well Data Storage
6.3.5 did we do? 1.2.3.3.4
Quarterly Cadence 6.6.1.1 TTP's
6.3.5.3
Too Late 1.2.4.1
6.6.2.1 6.6.2
1.2.4.6
Correct? Accuracy What can
Source Risk
we do better?
6.6.3.1
1.3.1.1
Fit for Purpose Deduplicate
Available
Resources 1.3.1
6.6.3.2 6.6.3 List all topics 1.3.1.2
Tied to IRs Content 6.6 Group 1.3.2.1.1
Secrets
6.6.3.3 Relevance Define 2.1.1.1
Complete? Stakeholder Analysis
Necessary 1.3.2.1
Question Types
1.3.2.1.2
Mysteries
6.6.5.1
" Cost" to
Stakeholder
6.6.5
Delivery The Mind Map of Intelligence 1.3.2 1.3.2.2
1.3.2.2.1
One Question
1.3.2.2.2
2.1.1
2.1.1.3
Dissemination
2.1.1.4
2.1.2.1.1
Technical
2.1.2.1.2
Analytical
Question Basics Focused Process & Procedures Production
Architecture
6.6.6.1 Generate Questions
Streamline (Requirements) 2.1.1.5 2.1.2.1.3
6.6.6 1.3.2.2.3
Analysis People & Networking
6.6.6.2 1.3.3.1 Single Decision
Update
Workflow & List all Stakeholders
2.1.1.6 2.1.2.1.4
Process Knowledge Management
6.6.6.3
1.3.3 1.3.3.2 Collection
Automate
What can
Improve?
Author: Freddy Murre 1.3
Prioritize all Stakeholders Develop Criteria
1.3.3.3
Prioritize Stakeholders
2.1.1.7
Tracking
2.1.2.1.5
Contextual Domain
6.6.7.1
Intelligence 2.1.1.8 2.1.2.1.6
Possible
6.6.7.2
6.6.7
Decipher
6 Version: 0.7.42 March 2024 Requirements 1.3.4.1
Valuable
Training Communication & Organizational
5.1.1.3
5.1.1 -How secure are we, really? Management 1.3.4 1.3.4.4
2.1.2.3 2.1.2.4.3
Analysis Manager
Collection Operations
Manager (CRM)
-Operational-Level Questions to support Decision: Address Breach New Intel from cases Lessons Identified 1.3.4.6 2.1.2.4.5
5.1.2.1.3
Timely 2.1.2.5 Analytic Ombudsman
People & Networking -How many vulnerabilities have been patched? Analytic Ombudsman
6.8.1.3.3 6.8.1.3
5.1.2.1 6.7.2
Customers Lost Mean Cost of Breach
5.1.2.1.4
Skill & Competencies -How many threats have been found? Lessons Learned 6.7 1.3.5 1.3.4.7
Prioritize all Decision(s) supported
Knowledge Management -What sort of attack attempts were blocked by perimeter defences? Implement 2.1.3.1
5.1.2.2 6.8.1.3.4 6.8.1.4 Requirements Ticketing & Tracking system
Reputational Effect Incident Criticality Impacted by CTI 6.7.3
5.1.2.1.5 Available 2.1.3.2.1
Communication
5.1.2 5.1 -Tactical - Technical-Level Questions to support Decision: Update 1.3.6.1
Manual
People Resources 6.8.1.5
" Best Practices" Key Stakeholders
5.1.2.1.6 Mean time to Detect (MTTD) Prioritized 2.1.3.2 2.1.3.2.2
Organizational Intel Requirements Collection Semi-Automatic
6.7.4 1.3.6.2
5.1.3.1 6.8.1.6 Requirements
Sharing System Mean time to Respond (MTTR) Roadmap & 1.3.6 2.1.3.2.3
5.1.3
Prioritization Map Requirements Automatic
1.3.6.3
6.8.1
Technology 6.8.1.7 Sources
5.1.3.2
Decision-Maker Initiated Changes Most Value & Advanced 2.1.3
2.1.3.3.1
Tracking System (Difficult) 1.3.7 1.3.6.4
Technology Spreadsheet 2.x.3.3.1
5.2.1.1.1.1 6.8.1.8 Vendors Centralized
Background Risk Reduced by CTI
Prioritize Intelligence
Accessible
Requirements 2.1.3.3.2
Structured Data Fields
1.3.6.5 TIP
5.2.1.1.1.2 6.8.1.9 Products & Services Reporting Function
Expectations Changes to Threat Models (Liz)
2.1.3.3.3
2.1.3.3
1.4.1 1.3.6.6
Data Store DataBase
5.2.1.1.1.3 6.8.1.10
Analyse Production Quality
Interests Inform New or Existing Risks
Needs 2.1.3.3.4
1.3.6.7 Ticketing & Tracking
5.2.1.1.1.4 6.8.1.11 Cadence
Agenda Impact to Reputation 1.4.2
1.4 Develop, adjust 2.1.3.3.5
1.3.6.8 Wiki
5.2.1.1.1.5
Capability
6.8.1.12
Level of Preparedness
Intelligence or Discontinue Resources
5.2.1.1.1
Stakeholder(S) Production 1.4.3 1.3.6.9
5.2.1.1.1.6 6.8.1.13
Product Portfolio Timeline 2.1.3.4.1
Knowledge Overall Intelligence Program Value Requirements Spreadsheet
1.4.4
6.8.1.14
5.2.1.1.1.7
Non-Sec projects Supported by CTI
Templates & Style Guides 2.1.3.4.2
Clearance Level Link Charting
What we 1.4.5
6.8.1.15 2.1.3.4
5.2.1.1.1.8 Pre-emptive decisions based on
will be producing Reporting Matrix Analysis 2.1.3.4.3
Time Available Forecasting TIP
2.1.3.4.4
Analysis Tool
1.5.1
5.2.1.1.2.1
Strategic
Analytic Framework
1.5 2.1.3.4.5
Production
Risk
5.2.1.1.2.2 6.8.2.1 Intelligence 1.5.2
Analytic Standards
Operational False Positive Ratio
5.2.1.1.2
Stakeholder Levels
5.2.1.1 Analysis 1.5.3
Audience
5.2.1.1.2.3
Tactical
6.8.2.2
# and % of Discovered Critical Risk &
Management Improvements & Maturity 2.1.3.5.1
IOC's
Vulnerabilities Eliminated
Operations 5.2.1.1.2.4 1.5.4
Technical 2.1.3.5.2
6.8.2.3
Role & Responsibilities 2.1.3.5
Dissemination TTP's & Insights
How we will
# & % of Correct & Incorrect Intel Analyse
5.2.1.1.3.1 2.1.3.5.3
High 6.8.2.4 Knowledge & Intelligence
Compliance Level of Addressing
5.2.1.1.3 1.6.1
5.2.1.1.3.2
Vulnerabilities
Stakeholder Priority Coverage
Medium 1.6
6.8.2.5
5.2.1.1.3.3
Low 5.2.1.1.4
Countermeasures Enacted Intelligence 1.6.2
Gaps
Internal & External
6.8.2.6
Collection 1.7.1.1.1
# and % of (un)Successful Phishing Situational Awareness
Attempts over Time (Trends)
Management 1.6.3
1.7.1.1
5.2.1.2.2.1
Facts
6.8 Long-Term Risk Reduce Uncertainty
6.8.2
5.2.1.2.1 6.8.2.7
Possible Value &
Summarize Medium-Term
1.7.1.1.2
Cause & Effect
5.2.1.2.2.2 Meeting Intelligence Requirements New IOCs Detected How and What
Comments
Intermediate (Medium) Feedback & Short-Term we will Collect
1.7.1.2
Decision Support
5.2.1.2
5.2.1.2.2.3
Assumptions
5.2.1.2.2
Meeting Information Needs Intelligence Question or Issue for
6.8.2.8
New Incidents Discovered from TI Generate Metrics Intelligence &
2.2.1.1.1
Identify
5.2.1 Stakeholder(s)
Decision 1.7.1.3
5.2.1.2.2.6
6.8.2.10
Mitigation Effect
Management Success Criteria(s) 2.2.1.1.3
Plan & Do
What
Remaining Uncertainties 1.7.1.5 What resources
Strategy formulation we have available Who the
2.2.1.2.1.3
6.8.2.11 Stakeholder(s) are
What Good Where
Risk Reduction over Time (Trends) 2.2.1.2.1
looks like 5W+H
1.7.1.6
2.2.1.2.1.4
5.2.1.3.2.1 6.8.2.12
Operational Activities
2.2.1.2 Why
Clarity Intelligence Usability Intelligence
2.2.1.2.2
5.2.1.3.1 Who's Asking
Summary in one Sentence 1.8.1 Requirements Analysis
5.2.1.3.2.2
for what 2.2.1.2.1.5
Relevance
5.2.1.3 6.8.2.13
Intelligence Impact 1.8 Resource Flexibility 1.8.2.1 1.9.1
When
Message Measures of Performance
5.2.1.3.2.3 5.2.1.3.2 Feedback & 1.8.2
Stakeholder Engagement 2.2.1.2.3
Decision(s) 2.2.1.2.1.6
Brevity Quality Control 5.2.1.4 6.8.2.14
Standards Management supported How
Storyline & Standards % of Alerts Created from TI Metrics 1.8.2.2
Measures of Effectiveness What the
5.2.1.3.2.4
Security 6.8.2.15
Management 1.8.3 1.9.2
Intelligence Requirements
Stakeholder(s) really
wants to know
% of Incidents initiated based on TI Scales 2.2.1.3.1
Strategic
5.2.1.3.2.5
Management (IRM)
Ease of Assimilation
5.2.2.1 6.9 1.9.3
2.2.1.3.2
Operational
Valuable
6.8.3.1
Present Feedback How and What 1.9.1
Financial Management 2.2.1.3
Level
we will Measure Funding 2.2.1.3.3
5.2.2.2 # and % of Incidents Identified, & Metrics 1.9.4 Tactical
Timely Worked and Solved
1.9.2 Risk Management
6.8.3.2
Priorities 2.2.1.3.4
5.2.2.3
5.2 # and % of Vulnerabilities
1.9.5 The Priority Technical
Relevant Resource Management and Focus we
Dissemination Discovered, Assessed, and Patched
(or not) 1.9
1.9.3
Budgets
should have
5.2.2.4 5.2.2 1.9.6
Accurate Actionable Plan 6.8.3.3 Intelligence 1.9.4 1.9.4.1
Intelligence Programme 2.2.1.4.1
Context
# and % of GW, FW & AV Detections Staffing Plans Skills Matrix Development
5.2.2.5 Program 2.2.1.4
Decision(s) Supported
Consumable & Available 1.9.5
5.3.1.1.2.1 5.3.1.1.1
6.8.3.4
# and % of Intelligence Products, Management Technology Plans
1.9.7
Communications & 2.2.1.4.2
SOC Threat Hunters 5.2.2.6 5.2.3 Pages, write ups, or blogs Created Key Value(s)
Tailored Knowing your audience & stakeholders will help you answer these questions: Feedback Management
5.3.1.1.2 Pull vs Push 1.9.6
5.3.1.1.2.2 Blue Team - Stakeholder(s) Capacity & Capability to Process 6.8.3.5
Roadmap & Development The decision(s) 2.2.1.5.1.1
IRT - How does the audience take in and absorb information? # and % of IOCs Discovered, 1.9.8 we will Support Product Type
5.3.1.1.3 2.2.1.5.1
Red Team - How much time does your primary audience have to digest your product?
Generated, Ingested, Enriched, and 1.10 1.9.7
Scheduling Management Explicit
Escalated 2.2.1.5.1.2
5.3.1.1.4 - Should the output be a short, focused article for a senior decision maker or a longer piece with more detail that will serve a more Maturity Integrations Time
Purple Team operational audience? 6.8.3.6
Format
5.3.1.1.5
Forensics CSIRT & CDC - Is there a need to develop different products in different formats? 6.8.3.7 2.2.1
2.2.1.5.1.4
Language
- What is the appropriate language and vocabulary? # of Feeds Ingested
6.10 Direction 2.2.1.5.2
Implicit
- Outputs 2.2.1.6
2.2.1.5.1.5
5.3.1.2 - How many and what types of products do you need to plan for? 6.8.3.8 Feedback on Dissemination
Policies, Regulations & Laws
Capability limitations
Security Engineers - Do your audience need the raw data?
5.3.1.3
IT Security - Where and how will you store them after they are released? 6.8.3.9 Metrics 2.2.1.7
- Format of key message # and % of Threat Actors Identified, X.X Production Mgmt
prioritized, and Investigated
5.3.1.3.2
Security Architects 5.3.1.4 - What is the likely format of the main message and its storyline? Feedback
Risk Mgmt - How can you adapt your narrative into a format or structure the end users are accustomed to (PowerPoint, briefs, large reports, etc.)? 6.8.3.10 2.2.1.8
- Will the message be clearest through a map, a briefing or a report? # & % of New Intelligence Analysis Mgmt
Requirements Identified, Generated,
5.3.1.5 - Is the customer more likely to use a hard or soft copy of a product? Processed and Answered
Vulnerability Mgmt - Should it be colour or black and white? 2.2.1.9
- Should the product be short or long, in paragraphs or bullets, with few or many visuals? 6.8.3.11 Collection Mgmt
# and % of Views and Downloads of
5.3.1.6 - Is it possible to capture the essence of your message in one or a few graphics? Intelligence Products, when, by who
Anti-Fraud - Should your findings be summarized in an executive summary? and how 6.8.3
2.2.1.10 2.2.1.10.1
- Communicate Uncertainty
6.8.3.12
Least Value & Starter Expectation Mgmt Success Criteria(s)
5.3.1.7
- How will you communicate uncertainty in your graphics and your narrative? # and % of Survey Replies (Easy)
Insider Threat Mgmt 5.3.1 - What is the best way to report and communicate on the limitations of your analysis?
6.8.3.14 2.2.1.11
Internal - Is your audience accustomed to statistical terms or do you need to use more qualitative terms to reflect on confidence and probability # and % of Probe Attempts Detected Metrics Mgmt
5.3.1.8
levels? 2.2.2.1.1
HR - How will you differentiate between facts and assumptions? 6.8.3.15 Stakeholder
- Dissemination strategy # and % of Phishing Attempts Specifications
Identified and Blocked
- How will your end users access your outputs? 2.2.2.1.2.1
Analogue
5.3.1.9.1 5.3.1.9 2.2.2.1.2
Physical Security Corporate Security - How will you share and document data and methods to ensure transparency and the possibility to verify or reproduce result? 6.8.3.16
Product & Service
- Do you need to attach raw data, reference documents and other supporting evidence to your document and presentation? # and % of Malware Identified and 2.2.2.1.2.2
Digital
Blocked by Which Detection
- What are the protective measures you need to implement and communicate in case of sensitive information? 2.2.2.1
5.3.1.11.1 5.3.1.10 Systems Format
CFO - Who needs to receive the final output?
Directors & Managers
5.3.1.11.2
- Who else needs to be aware it exists? 6.8.3.17 2.2.2.1.3.1
Individual(ly) or Groups(s)
# and % of Click Ratio of Phishing 2.2.2.1.3
CRO - Branding What format
Briefing
Attempts the product should
5.3.1.11.3 - How the final product will be branded? be disseminated
2.2.2.1.3.2
Online or In-person
CISO 5.3.1.11 - Will names or logos be included in the end-product? 6.8.3.18
5.3.1.11.4 C-Suite - How do you want the document to be further quoted? # and % of IOCs Identified, 2.2.2.1.4
2.2.3.1.2 2.2.3.1.2.1
Explanatory Why?
5.4.2.1.1
Analog
5.4.2.1
Product 2.2.3.1.3 2.2.3.1.3.1
Evaluative What Does it Mean?
5.4.2.1.2
Digital
5.4.2.2
Type of
Phone & Video analysis 2.2.3.1.4 2.2.3.1.4.1
Estimative What Happens Next?
5.4.2.3
2.2.x
Messaging Service Product
2.2.3.2.1
Requirements?
5.4.2.5.1
5.4.2.4
Email 5.4 5 Intelligence 2 Exploration
2.2.3.2.2
Personal
5.4.2.5.2
5.4.2.5
Briefing & Presentation 5.4.2
Select Delivery Dissemination Architecture Direction Diagnostic
5.4.2.9
Social Networks 2.2.3.3.1
Adapt
5.4.2.10
Conferences, forums, events 2.2.3.3 2.2.3.3.2
Tool(s) Build
5.4.2.11
Feed 5.4.3 Type of
2.2.3.3.3
Delivery Variance Tool(s)
Buy
5.4.2.12
Flat Files 2.2.3.4
Skills & Knowledge
2.2.3.5.1
Intel cycle
5.4.4.1
Long-Term & Annually 2.2.3.5 2.2.3.5.2
Intel Model(s) Cyber Kill Chain
5.4.4.2
Combination 2.2.3.5.3
Medium-Term & Quarterly of Intel Model(s) Diamond Model
4.1.1.1.1
5.4.4.3 Analytical Standards,
Short-Term & Monthly & Models & Procedures
4.1.1.1
Weekly & Daily Analysis 2.2.4.1
4.1.1.1.2 Intel Gaps
5.4.4
Identify & Manage Bias
5.4.4.4 Delivery Cadence
On-Demand 4.1.1 Data, information, or
Intelligence needed
4.1.1.2.1 Process & Procedures 2.2.4.2.1
5.4.4.5 Templates Internal
Ad-hoc 2.2.4.2
Sources
4.1.1.2.2 4.1.1.2 2.2.4.2.2
Who's asking
5.4.4.6 Style Guides Production for what, External
Near Real-Time 5.5.1
TLP 4.1.1.2.3
.. by when,
etc
2.2.4 How and Where
Estimative Language to get it
5.5.2 Collection 2.2.4.3.1
NATO Build
4.1.1.2.4
5.5 Sourcing Requirements
5.5.3
Classification & 2.2.4.3
Access
2.2.4.3.2
Develop
FOUO & SBU
Restrictions 4.1.2.1.1 2.2.4.3.3
5.5.4 Technical 2.2.4.4 Buy
Processing
Encryption
4.1.2.1.2
Analytical
5.5.5 2.2.4.5
Time
Tear Line 4.1.2.1.3
People & Networking
2.2.6.1.1
2.2.5
4.1.2.1 Paraphrase
4.1.2.1.4
Skills & IR Analysis
Knowledge Management
5.6.1 Competence Who, What, Where, 2.2.6.1 2.2.6.1.2
IRs & Question(s) 180 Degrees
Automated 4.1.2.1.5 4.1.2
When, Why, How Rephrased
Contextual Domain People
Feedback 2.2.6.1.3
5.6 4.1.2.2
4.1 2.2.6.2 Broaden Focus
4.1.2.1.6
Availability Decision(s) Supported
Communication
5.6.2
Enable Resources 2.2.6.1.4
Hybrid Feedback 2.2.6.3 Redirect Focus
Feedback & 4.1.2.1.7
Organizational
Time
4.3.3.1.1
5.6.3 Metrics Political 2.2.6.4
2.2.6.1.5
Ask "why?"
Product Type
Manual Feedback 4.1.3.1
2.2.6
4.1.3.x.1
4.3.3.1.2 Data Collection & Concepts & Ideas Read-Back 2.2.6.5
Military Processing Tools Organizer Quality
5.7.1.1
Prepare Delivery Platform 4.1.3.x.2 4.1.3.x 2.2.6.6
4.3.3.1.3 Integrated Data Data Management Expectation Management
5.7.1.2 5.7.1 Economic Repository
Adapt Intelligence to Platform System
Pre-Delivery 2.2.7
2.2.6.7
4.3.3.1 4.1.3.x.3
Metrics
4.3.3.1.4 Adjust if needed
5.7.1.3 PMESII Data Visualization Tools 4.1.3.x
Apply Classifications Social Intelligence
5.7.2 2.2.6.8
Management Write-up of the agreed
5.7.1.4 Schedule Delivery 4.3.3.1.5
4.1.3.2.1
System point
Spreadsheet 4.1.3
Supplementary Materials 5.7 Infrastructure Technology
5.7.3 Deliver 4.1.3.2.2
4.1.3.2
Analysis Tools
Link Charting
Send Out 4.3.3.1.6
5.7.5.1
Intelligence Information 4.3.3.2.1
Notifications Adversary 4.1.3.2.3
Confirm Receipt Strategic <--> Technical 4.1.3.3
Collection Automatic
What we don't know
4.3.x 2.4.3 we don't know
4.3.3.4.16
Standardization 3.1.3.2.4
Processing Build Action Plan
Exfiltration
2.5.1.1.1
4.3.3.4.6
4.3.3.4 4.3.7.1 Entity Recognition 4.2.1.2
Requirements
Mitre Chronologies & Simple & Obvious 3.1.3.4.2 2.5.3
Credential Access
Timelines 4.3.7 4.2.1.3 4.2.1 3.1.3.4
Link Charting Development Specific Intelligence
4.3.3.4.7
4.3.7.2 Structuring Complicated Cynefin
Collection Analysis
3.1.3.4.3
Requirements (SIR)
Discovery TIP Platform
Pattern Recognition Broken down Into
4.2.1.4
4.3.3.4.8 4.3.8
Complex Systems
Lateral Movement New Intelligence & 3.1.3.4.4
Strategic Analysis Tool 2.5.4
All of the Answers
4.3.3.4.9
Collection Requirements 4.2.1.5
we Need to Find Essential Elements
Chaotic Systems
Collection of Intelligence (EEI)
4.3.9 3.1.3.5.1 3.1.3.5.1.1
4.3.3.4.10 New Technology, Skills & IOC's MISP
Command & Control 4.4.1.1 Source Requirements 3.1.3.5
Collection Sharing 3.1.3.5.2
4.3.3.4.11
Admiralty Scale 4.x.x.1
TTP's & Insights
Exfiltration (NATO) Link Charting
3.1.3.5.3 3.1.3.5.3.1
4.3.3.4.12 4.4.1.2 4.4.1 4.x.x.2 4.x.x Knowledge & Intelligence Wiki
4.5.3.4.2.1.1 Impact 3x5x2 (UK) Source & Info Evaluation Network Analysis Link & Network Analysis
Sorting 3.2.1 2.6.1
4.5.3.4.2.1.2.1
Ranked Voting
Prioritizing
Evaluation Analysis (SNA) 2.6
Management 2.6.2
4.5.3.4.2.1.2.3
4.5.2.1.1.4.4
Scientific Method Manager Objectivity 2.7
4.5.3.4.2.2.2 Experiment 4.5.1.2
Cluster Brainstorming Explanatory 4.5.1 3.2.3.4 Analysis Management
4.5.2.1.1.4.5 Analytical Spectrum Future Needs
4.5.3.4.2.2.3 Analysis 4.5.1.3
Nominal Group Evaluative
Techniques What type of
4.5.2.1.1.4.6 2.8.1
Conclusion 4.5.1.4 analysis we will use
4.5.3.4.2.2.4 4.5.3.4.2.2
Estimative Integrated
CircleBoarding Exploration SAT Requirements
3.3.1 3.3.3.1
Tangible
Venn Analysis Schematize 3.3.3.4 2.8.4
4.5.2.2 3.3.6.2.1.2
Confirmation Primary & Secondary 3.3.6.2.1.2.2 Sequential or
Available Knowledge 3.3.3 3.3.6.2.1
Testimonial
4.5.3.4.2.2.8 4.5.2.1.2.1.4
4.5.2 4.5 Collect From Sub-Sourcing
Network Analysis Build Case 4.5.2.1.2 Collection 3.3.3.5
SenseMaking System 1 Thinking Analysis Deadlines
3.3.6.2.1.3 3.3.6.2.1.2.3
4.5.3.4.2.3.8.3
Deception Detection 3.3.8 Stakeholder(s)
(sometimes) Case & Incident Handling Intelligence Plan 2.11.4
4.5.3.4.1.2
MOSES
Finding and Assessing Evidence 4.5.3.4.1 Legality Intelligence Production
4.5.3.4.2.3.9 3.3.6.7 3.5.1.1.2
Mirror Imaging Bias 4.5.3.4.2.3.8.4
EVE
Argument Mapping Critical Thinking & 4.5.3.1 Influencing Factors Red Teaming Plan
4.5.3.4.1.3 Expert Judgement Slow 3.5.1.1
How we will Manage &
Building an Argument Direct the Process
Confirmation Bias 3.3.6.8 Internal Investigations 3.5.1.1.3
4.5.3.2 Timeliness Purple Teaming 2.11.5
4.5.3.4.2.4.1
4.5.3.4.1.4
Deliberate 3.4 3.5.1.2 Dissemination
Vividness Bias Communicating your 4.5.3
Outside-in Thinking Security Solutions
Message Effectively 4.5.3.3 System 2 Thinking Research 3.5.1.1.4
Threat Hunting
Evidence 4.5.3.4.2.4.2
Conscious 3.5.1.3
X.X
Acceptance
Bias
Structured Analogies
4.5.3.4
Logs Feedback 2.11.6
Analytic
Feedback & Metrics
4.5.3.4.2.4.3 3.5.1.4
Hindsight Bias Red Hat Analysis 4.6 3.5.X Apps & Programs
4.5.3.5 3.5.1.1
Logical Integration / Source Internal
4.5.3.4.2.4.4 3.5.1.5
Quadrant Crunching Synthesis Identification Users
4.5.3.4.2
4.5.3.4.2.4.5
Six Structured Analytical 3.5.1.6
Premortem Analysis Techniques (SAT) 4.7.1 Internal Functions &
Families Gap Analysis 3.5.1
Activities
3.5.2.2.1
4.5.3.4.2.4.6 Sharing Groups
Structured Self-Critique 4.5.3.4.2.4
4.7 Source Type
Reframing SAT 4.7.2 3.5.1.2.1
x.x.x.x
Devil's Advocacy 4.5.3.4.2.6.1 4.8.3.2.1 3.6.1
Opportunities Incubator Stakeholder's Terms Raw Data
4.8.3.2.2.1
x.x.x.x
Cyber Kill Chain
Multiple 4.5.3.4.2.6.2 3.6 3.6.2
Impact Matrix 4.8.3.2.2.2 4.8.3.2.2
Scenario
Generation
Diamond Model
Models, Graphs & Graphics Collecting! Exploited
4.8.3.2.2.3
4.5.3.4.2.6.3 3.6.3
Mitre ATT&CK
Bowtie Matrix 4.8.3.2 Intelligence
Format & Template 3.7.1.1.1
4.5.3.4.2.6.4 4.8.3.2.3.1
Reliability of Information
Narrative-Flow
SWOT Analysis
4.8.3
4.8.3.2.3.2
4.8.3.2.3 3.7.1.1 3.7.1.1.2
4.5.3.4.2.6.5 4.5.3.4.2.6 Tied to Value
Telling a Story Product Validity & Accuracy of Relevancy of Information
Critical Path Analysis Decision Support SAT Information
4.8.3.2.3.3