Transcript
Podcast Host (0:02)
You're listening to the Cyberwire network.
Cybersecurity Expert (0:04)
Powered by N2K.
Podcast Host (0:14)
The DMV has established itself as a top tier player in the global cyber industry. DMV Rising is the premier event for cyber leaders and innovators to engage in meaningful discussions and celebrate the innovation happening in and around the Washington D.C. area. Join us on Thursday, September 18th to connect with the leading minds shaping our field and experience firsthand why the Washington D.C. region is the beating heart of cyber innovation. Visit DMVRising.com to secure your spot. Think your Certificate security is covered by March 2026 TLS, certificate lifespans will be cut in half, meaning double today' renewals and in 2029, certificates will expire every 47 days, demanding between eight and 12 times the renewal volume. That's exponential complexity, operational workload and risk. Unless you modernize your strategy, Cyberark proven in identity security is your partner in certificate security. Cyberark simplifies lifecycle management with visibility, automation and control at scale. Master the 47 day shift with CyberArk Scan for vulnerabilities, streamline operations, scale security visit cyberark.com 47day that's cyberark.com the numbers 47day.
Rick Howard (2:01)
The word is the diamond model spelled diamond as in the shape of and model as in a representation to show the construction of something A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain, the adversary, their capability, the infrastructure used or attacked, and the victim. Example sentence the diamond model allowed security analysts to attribute with high confidence that Sandworm penetrated Ukraine's government networks and context. Sergio Caltagironi, Andrew Pendergrast, and Christopher Betts, who in 2011 were working for the U.S. department of Defense, published their paper the Diamond Model of Intrusion Analysis, in which they laid out a methodology to describe how cyber adversaries use their capabilities and infrastructure against victims. The authors were riffing off something called attack trees, originally proposed by cybersecurity luminary and thought leader Bruce Schneier. Schneier's idea was that attack graphs attempt to generate all possible attack paths and vulnerabilities for a given set of protected resources to determine the most cost effective defense and the greatest degree of protection. It's a terrific idea, but it didn't scale. The diamond model authors attempted to formalize the language around cyber incidents, and it was a first step to improve that situation. In their model, they build activity threads that combine intelligence and traditional attack graphs into activity activity attack graphs by Merging traditional vulnerability analysis with knowledge of adversary activity. As analysts collect intelligence using the diamond model, the kill chain becomes more complete with data for all the incidents. At a certain point, analysts might note that the diamond model event for the delivery phase and the command control phase in incident one is remarkably similar to the events captured in incident two. These activity threads connect the two incidents together, may indicate that the attacks have originated from the same adversary, and implies a much broader campaign against your network. According to the paper, the diamond model's events can then be correlated across activity threads to identify adversary campaigns and coalesced into activity groups to identify similar events and threats which share common features. In simpler terms, this process is how we get all of those colorful names that splash across as headlines in the CyberSecurity news space. For example, Chinese APT10 hackers use zero login exploits against Japanese orgs or ferocious kitten. Six years of COVID surveillance in Iran or the Lazarus Group may have been behind the 2009 attacks of European targets. To be clear, the diamond model is not an alternative to the Lockheed Martin kill chain model or the MITRE attack framework. It's an enhancement. The diamond model's atomic element, the event, with its four core features, is present at each phase of the intrusion. Kill chain. From the diamond model paper. The kill chain provides a highly effective and influential model of adversary operations which directly informs mitigation decisions. Our model integrates their phased approach and complements kill chain analysis by broadening the perspective, which provides needed granularity and the expression of complex relationships amongst intrusion activity. End quote Nerd reference in 2020, Andy Pendergrass, now working for ThreatConnect, gave a presentation about the evolution of the diamond model.
![Diamond Model (noun) [Word Notes] - Hacking Humans cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F26aeda9a-9259-11f0-86e9-8764a82ca195%2Fimage%2F441b0ca2db080b93b935568d381ce462.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)