Skip to Content
JCPJournal of Cybersecurity and Privacy
  • Article
  • Open Access

9 June 2024

An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure

,
,
,
and
1
CIMTI, Faculty of Engineering, University of Saint Joseph, Beirut 1104, Lebanon
2
Centre de Recherche Scientifique en Ingénierie (CRSI), Faculty of Engineering, Lebanese University, Hadath 1533, Lebanon
3
Potech Labs, P.O.TECH, Beirut 1107, Lebanon
*
Author to whom correspondence should be addressed.

Abstract

Emerging cyber threats’ sophistication, impact, and complexity rapidly evolve, confronting organizations with demanding challenges. This severe escalation requires a deeper understanding of adversary dynamics to develop enhanced defensive strategies and capabilities. Cyber threat actors’ advanced techniques necessitate a proactive approach to managing organizations’ risks and safeguarding cyberspace. Cyber risk management is one of the most efficient measures to anticipate cyber threats. However, it often relies on organizations’ contexts and overlooks adversaries, their motives, capabilities, and tactics. A new cyber risk management framework incorporating emergent information about the dynamic threat landscape is needed to overcome these limitations and bridge the knowledge gap between adversaries and security practitioners. Such information is the product of a cyber threat intelligence process that proactively delivers knowledge about cyber threats to inform decision-making and strengthen defenses. In this paper, we overview risk management and threat intelligence frameworks. Then, we highlight the necessity of integrating cyber threat intelligence and assessment in cyber risk management. After that, we propose a novel risk management framework with integrated threat intelligence on top of EBIOS Risk Manager. Finally, we apply the proposed framework in the scope of a national telecommunications organization.

1. Introduction

With digital transformations, interconnectivity, and intelligent systems, digital breaches have become more severe and widespread. Incompetent cybersecurity is proven to cause increasing losses [1] and can range from relatively minor to catastrophic financial damages, highlighting the critical need for robust cyber risk management [2]. Organizations employ cyber risk management frameworks to identify, assess, treat, and monitor their digital risks. Despite substantial investments in cyber readiness, many organizations lack proper situational awareness of the threat landscape and their adversaries [3]. The shift of critical infrastructures towards automation and digital connectivity has increased their vulnerability to diverse external threats such as state-sponsored groups, organized crime, and activists [4]. These adversaries continuously refine their strategies, outpacing the organizational cyber defenses. Despite the significant projected growth in the risk management market to address the rising frequency and complexity of cyberattacks [5], organizations still face escalating challenges. These challenges push cybersecurity spending beyond budgeted amounts due to penalties, revenue losses, and other costs stemming from security breaches [6].
Risk management often accounts only for the internal context, without consideration for threat actors [7]. Therefore, it has become necessary to analyze adversaries continuously during risk management. Threat assessment is already a pillar in existing cyber risk management frameworks, such as EBIOS Risk Manager. However, it still does not include information about cyber threats. A more complete approach is required by integrating the cyber threat intelligence process output into the cyber risk management process, allowing more precise risk assessments and timely adaptations. Threat intelligence provides valuable information about threat actors that can be utilized to adapt risk assessment strategies and prioritization [8,9].
Given the dynamic nature of cyberattacks and the inherent unpredictability of their associated risks, organizations are compelled to rely on threat intelligence as a strategic approach for responding to highly unpredictable and elusive cyber threats [10]. While cyber threat intelligence has been a necessary process supporting organizations in responding to cyberattacks, it is still a novel practice. It requires better exploitation in other security practices, especially cyber risk management. It provides essential information for risk managers [11], allowing them to consider their organizations’ context and adversaries, thereby breaking the knowledge imbalance between attackers and defenders, leading to better risk assessments and mitigation prioritization.
Cyber threat intelligence provides knowledge about threat actors, their corresponding objectives, and their means to reach these objectives. Strategic, operational, tactical, and technical threat information can be utilized to identify, evaluate, and respond to risks. Enhancing the efficiency of cyber risk management is one of the main objectives of a cyber threat intelligence program [12]. However, integrating cyber threat intelligence into practical organizational practices remains uncommon [10,13].
Cyber risk assessment can produce overwhelming security weaknesses and corresponding remediations for an organization to implement, making the remediation plan overwhelming. Considering adversaries’ techniques and tactics can improve the risk assessment output regarding results, prioritization of security controls, and proactive response to emerging threats [14].
This paper’s novelty and contribution lie in its proposal for enhancements through the continuous integration of cyber threat intelligence into an existing cyber risk management framework. We consider EBIOS Risk Manager as the baseline risk management framework and propose new modifications to its process. Then, we apply the designed framework to critical national infrastructure.
The remainder of this paper is structured as follows. Section 2 overviews relevant work in cyber risk management and cyber threat intelligence to highlight the gap addressed by our contribution. Section 3 presents the proposed risk management framework with integrated cyber threat intelligence. Next, Section 4 lays out an application of the proposed framework. Finally, Section 5 concludes the paper.

3. Methodology and Process

The design science research process model (DSRP) [50] was followed. The research model includes problem identification and motivation, objective identification for the new framework, design, and development of the cyber threat intelligence integration in the risk management process, demonstration, and evaluation of the framework. The phases’ details are presented below.
  • Problem identification and motivation: The existing literature and documentation of cybersecurity risk management and threat intelligence frameworks were reviewed to identify the gaps, including frameworks, methodologies, and industry best practices. Current risk management methodologies often focus on technical vulnerabilities, overlooking the motives and tactics of threat actors, which limits their effectiveness in addressing emerging threats [51]. Integrating cyber threat intelligence into risk management is still uncommon, and there is a need for systematic approaches to incorporate threat intelligence feeds effectively [10,13]. Existing frameworks often struggle to adapt to the dynamic threat landscape, highlighting the importance of considering adversary techniques for proactive risk mitigation [14,52].
  • The solution’s objective: This research aims to propose novel threat intelligence integration into an existing risk management process to enhance the process and response to emerging cybersecurity threats.
  • Design and development: This phase includes selecting an existing cybersecurity risk management process and integrating threat intelligence into its different phases. The novel modifications in the EBIOS Risk Manager process aim to integrate the threat intelligence feeds into the different risk management phases. This leads to more accurate risk assessments that consider cyber threat actors’ capabilities and objectives and better treatment prioritization.
  • Demonstration: This phase presents the use of the proposed framework to manage the risks in the context of a national telecommunications gateway. The main aim is to demonstrate the framework phases and aspects by assessing and managing risks of a defined scope based on threat intelligence information.
  • Evaluation: This phase aims to evaluate and present the enhancements in the novel framework in contrast with the existing problem. This is achieved by analyzing the proposed framework, the results of its conducted application, and the existing frameworks in addressing the existing problem. This includes limitations such as the necessity of threat intelligence resources and implementation validation, which will be part of future work.

4. The Proposed Enhanced Cyber Threat Intelligence Integrated EBIOS Risk Manager

Threat intelligence and assessment is a dynamic and continuous process. Thus, any cyber risk management framework that integrates the process of systematic threat assessment and intelligence should consider the constant flow of threat intelligence information. The new process should consider both aspects by dynamically handling new threat intelligence information flow and adapting the risk assessment results.
EBIOS stands out as a suitable risk assessment framework to further integrate a cyber threat intelligence process. EBIOS has multiple entry points to integrate threat intelligence feeds of multiple types. First, the threat actors, addressed as risk origins, are identified and assessed based on past incidents and industry-specific threats, which can be enhanced further by threat intelligence information. Moreover, with the scenario-based risk evaluation, it incorporates strategic and operational attack paths, that are identified based on threat actors objectives and the existing scope. These attack paths can be constructed based on threat actors’ behaviors, as in [46], by considering threat intelligence information. These enhancements improve accuracy and provide realistic results, enhancing risk assessment scenarios and treatment. Therefore, the proposed framework builds upon EBIOS Risk Manager and integrates the output of a generic cyber threat intelligence process. Consequently, a prerequisite for applying this proposed framework in an organizational context is an active threat intelligence process that continuously generates cyber threat intelligence information and feeds it into the risk management process.
The framework accounts for different types of cyber threat information and adapts risk management’s discrete nature to the continuous flow of threat intelligence information.
The following are the detailed workshops of the proposed framework, as shown in Figure 3.
Figure 3. Cyber threat intelligence integrated risk management process.

4.1. Scope and Security Baseline

As described in EBIOS, this workshop aims to define the scope, business assets, supporting assets, processes, the corresponding feared events, and the security baseline. The feared events are assessed according to the severity scale in Table 2.
Table 2. EBIOS severity scale [21].
To integrate threat intelligence into the risk management process, it is essential to define the direction and objective of the data obtained from the existing threat intelligence process, such as the relevance of the information in time concerning business assets and processes within the scope.

4.2. Threat Intelligence and Assessment/Risk Origins

As described in EBIOS, this workshop identifies the origins of risk and its target objectives and correlates them with the context and the feared events. EBIOS advises organizations to check the high-level threat trends from the news without a deep dive into the threat actors and their specific capabilities.
To complement this workshop, we rely on threat intelligence data to accurately identify threat actors/risk origins interested in targeting the organization or its sector (e.g., healthcare, power plants, service providers, etc.). Thus, the primary inputs required from the threat intelligence process for this workshop are strategic information about emerging threats, threat actors, their motives, and their capabilities. Furthermore, in addition to the existing entities involved, an expert with knowledge about emerging threats and threat actors must participate in this workshop to accurately identify and assess risk origin/target objective pairs.

4.3. Strategic Scenarios

As described in EBIOS, this workshop aims to clearly understand the ecosystem stakeholders and their attributed vulnerabilities. The organization’s ecosystem consists of all the stakeholders within the identified scope, first identified, and then, assessed according to the parameters described in EBIOS [53]:
  • Dependency: describes the importance of the stakeholder in the specified scope.
  • Penetration: describes the level of access of the stakeholder in the specified scope.
  • Cyber maturity: describes the security capacities of the stakeholder in the specified scope.
  • Trust: describes the interests and intentions of the stakeholder against the organization’s objective in the specified scope.
These factors contribute to the calculation of exposure, which describes the stakeholder’s susceptibility to cyber threats, and cyber reliability, which describes the trust and confidence in the stakeholder’s security measures. The exposure, cyber reliability, and overall threat level are calculated based on the following equations:
E x p o s u r e = D e p e n d e n c y × P e n e t r a t i o n
C y b e r   R e l i a b i l i t y = C y b e r   M a t u r i t y × T r u s t
T h r e a t   L e v e l = E x p o s u r e C y b e r   R e l i a b i l i t y
After determining the stakeholders, high-level strategic scenarios are built to describe how a risk origin can reach the target objective through the stakeholders. The strategic scenarios are assessed to determine the risk scenario impact according to Table 2.
To complement this workshop, we consider strategic and tactical threat intelligence information about the identified risk origins to construct more accurate scenarios. This information reveals how the relevant risk origins might proceed to target the organization through its different stakeholders and suppliers, providing high-level attack paths more reliable than described initially in EBIOS Risk Manager. This allows for a better evaluation of the scenarios’ impacts. Additionally, an involved threat intelligence expert should participate in this workshop to contextualize the threat intelligence information.

4.4. Operational Scenarios

As described in EBIOS, this workshop aims to build operational attack scenarios based on strategic scenarios. The operational scenarios describe detailed attack paths for each strategic scenario and are assessed to determine the risk scenario likelihood according to Table 3, taking into account the existing weaknesses in the scope, including known vulnerabilities, access controls, and existing security controls, etc.
Table 3. EBIOS likelihood scale [21].
To complement this workshop, we consider the tactical and operational threat intelligence data about the selected risk origins to enrich the operational scenarios. Therefore, operational scenarios must be built using MITRE ATT&CK techniques, as described in [44]. These scenarios are constructed by cross-matching the organization’s context from the strategic scenarios and the implemented defenses with the risk origins’ capabilities and tactics from the threat intelligence process. This approach accurately reflects the potential operational attack paths of risk origins and allows for a better evaluation of the scenarios’ likelihood. Moreover, an offensive security expert should participate in this workshop to provide a perspective on the risk origins’ attacks that might be conducted against the organization.

4.5. Risk Treatment

As described in EBIOS, this workshop aims to plan the mitigations by selecting the security measures to be implemented and accepting selected risks. The introduction of threat intelligence information in the previous workshops allows for a more accurate evaluation of the risk scenarios in terms of likelihood and impact, thereby improving the prioritization of risks and their corresponding treatments. No modifications are necessary for this workshop.

4.6. Risk and Threat Monitoring

This phase is not described in EBIOS. It is a continuous phase where risks and mitigations are monitored, and real-time information is fed from the threat intelligence process.
Depending on the incoming information, the process is re-directed to one of the workshops:
  • Context changes: The whole process should be re-conducted if significant changes occur to the scope.
  • New information about threat actors: If new data are received about a new risk origin targeting the organization or a change in the objectives of a risk origin, the risk assessment is re-executed from the Threat Assessment/Risk Origins workshop to assess the new risk origin.
  • Strategical information: If strategic details that include new information about a risk origin or the compromise of one of the ecosystem stakeholders by a risk origin is received, the risk assessment is re-executed from the Strategic Scenarios workshop to re-assess stakeholders and re-build strategic scenarios.
  • Operational or tactical information: If operational or tactical information that includes new information about a risk origin operations, tactics, or the exploitation of a zero-day vulnerability is received, the risk assessment is re-conducted from the Operational Scenarios workshop to build new scenarios based on the new scope’s context and vulnerabilities.
After each redirection, the framework is resumed as usual while keeping the previous iteration results, adding the new findings, assessing the new risk scenarios, and re-prioritizing the treatment plan.
This phase is implemented as regularly scheduled workshops with the necessary involved parties to review the risks’ treatment progress and spontaneous ones to review the evolving intelligence information from the threat intelligence process.

5. Framework Application

Multiple case studies were conducted using EBIOS version three in critical infrastructure [54] and IoT [55] environments. In this section, we apply the proposed framework to the scope of the national telecommunications sector. The context consists of a national gateway that provides Internet connectivity for multiple Internet service providers, operated by a private entity, providing services for other private and public entities, and supervised by a national regulatory authority. To conduct the complete study, multiple meetings and interviews were held with the experts responsible for the gateway’s security, including the stakeholders responsible for maintaining and operating the gateway. As described by the staff during the interviews, the country’s telecommunications are an essential part of its critical infrastructure. Communications with the worldwide Internet ensure critical functionalities. Any disruption that might occur has nationwide consequences.

5.1. Scope and Security Baseline

The study’s scope is one international connectivity link, including all assets and processes established to maintain the infrastructure. Any disruption to the connectivity’s integrity, confidentiality, or availability causes severe political, social, and economic impacts. The study aims to uncover and analyze potential risk scenarios related to international connectivity and provide a proper remediation and improvement plan. The business assets and services in scope were identified manually during thorough interviews with the experts and stakeholders. The identified assets and services are the international media gateway, the transmission/transport network, and the contract with the external provider. Table 4 presents the assets and their supporting assets.
Table 4. Business assets and supporting assets details.
We identify the feared events associated with each asset and evaluate their severity according to EBIOS scales in Table 2. The main feared events are a sabotage of the Internet services; an espionage of critical information from the transport services; and a breach of the contracts’ terms and conditions due to a severe incident. The feared events are presented in Table 5.
Table 5. Feared events.

5.2. Threat Intelligence and Assessment/Risk Origins

We rely on the cyber threat intelligence process to identify and assess risk origins. Four main risk origin (RO) categories were identified, targeting similar infrastructure in the same industry and regional area:
  • RO-01: State-sponsored threat actor with an objective to sabotage Internet connectivity.
  • RO-02: State-sponsored threat actor with an objective to perform espionage and spying activities.
  • RO-03: Organized crime threat actor with a lucrative objective.
  • RO-04: A competitor with an objective of breaching the contracts’ terms in order to gain more clients.
The assessment of the identified risk origins and their target objectives, resources, and motivation is presented in Table 6. To proceed, we consider only the most relevant risk origins RO-01 and RO-02.
Table 6. Risk origins.

5.3. Strategic Scenarios

The stakeholders in the selected scope’s ecosystem are mainly equipment suppliers (SPs), service providers (PRs), clients (CLs), and external staff (ST). The identified stakeholders are evaluated in Table 7.
Table 7. Ecosystem stakeholders assessment.
Figure 4 shows the ecosystem threat mapping according to the calculated exposure and cyber reliability. The selected threat threshold for this study is 2. Stakeholders with threats above 2 are selected to build the strategic and operational scenarios.
Figure 4. Ecosystem threat mapping.
The selected critical stakeholders to move forward with the study are the external staff members ST-01 and the cable service provider SP-02. Unlike EBIOS Risk Manager, when building the strategic attack scenarios, we rely mainly on strategic threat intelligence information about the identified threat actors to identify potential strategic attack paths involving the ecosystem’s stakeholders. The following are the identified strategic attack paths (SAPs):
  • SAP-11: The attack path that can be used by RO-01 by exploiting a zero-day vulnerability to cut off the gateway services, as RO-01 is a threat group known for its capabilities to utilize zero-day vulnerabilities and develop new exploits. The impact of this scenario is assessed as critical.
  • SAP-12: The attack path that RO-01 can use through ST-01 to cut off the gateway services, as RO-01 is also known to rely on phishing campaigns and supply chain attack strategies. The impact of this scenario is assessed as critical.
  • SAP-21: The attack path that RO-02 can use through SP-02 to perform espionage activities on the international Internet gateway, as RO-02 is a threat group known for software supply chain attacks. The impact of this scenario is assessed as serious.
Figure 5 presents the strategic attack paths.
Figure 5. Strategic scenarios of the identified risk origins.

5.4. Operational Scenarios

We rely on each risk origin’s strategic scenarios and operational threat intelligence information to build accurate operational scenarios.
  • OAP-111: RO-01 scans the public-facing systems and identifies the used technologies. Once a zero-day vulnerability is discovered in one of the secondary systems, RO-01 develops an exploit and gains access to the internal network. After performing an internal reconnaissance, RO-01 moves laterally to reach the gateway and escalates privileges to gain control over the gateway services and its backups. Finally, RO-01 cuts off the gateway services and their backups. The likelihood of this attack path is assessed as likely.
  • OAP-112: RO-01 scans the public-facing systems and identifies the used technologies. RO-01 aims at discovering and exploiting zero-day vulnerabilities in the public-facing main gateway systems. After that, RO-01 gains access to the main gateway systems, disables the backup services, and cuts off the international connection. The likelihood of this attack path is assessed as very likely.
  • OAP-123: RO-01, knowing that ST-01 is part of the ecosystem, performs identity information gathering on ST-01 staff. Then, it compromises one of the applications used by ST-01 staff (drive by compromise) and sends spear-phishing emails to trick ST-01 users into downloading and executing a backdoor malware. Then, after internal reconnaissance, lateral movement, and privilege escalation, RO-01 reaches the gateway services, disables the backup services, and cuts off the international connection. The likelihood of this attack path is assessed as rather unlikely.
  • OAP-214: RO-02, knowing that SP-02 is part of the ecosystem, performs identity information gathering on SP-02 staff. Then, RO-02 sends spear phishing emails to gain access to one of SP-02’s systems. RO-02 deploys spying malware inside one of the administrative software provided by SP-02. After pushing a new update, the new malicious software mirrors network traffic and exfiltrates data. The likelihood of this attack path is assessed as likely.
The operational attack paths and the used MITRE ATT&CK tactics and techniques are presented in Figure 6.
Figure 6. Operational attack paths and used MITRE ATT&CK techniques of the identified strategic scenarios.

5.5. Risk Treatment

Based on the identified strategic and operational scenarios, four main risks were identified:
  • R-01: A state-sponsored threat actor sabotages Internet services by exploiting a zero-day vulnerability.
  • R-02: A state-sponsored threat actor sabotages Internet services by obtaining access to one of the stakeholders (ST-01).
  • R-03: A state-sponsored threat actor sabotages Internet services by obtaining access to one of the stakeholders (SP-02).
  • R-04: A state-sponsored threat actor steals information by mirroring the Internet traffic.
Table 8 presents the risks and their assessments in terms of likelihood and impact.
Table 8. Identified risks and their assessment.
To remediate the risk scenarios, a treatment plan is established. Table 9 presents the main treatment actions and priorities.
Table 9. Treatment plan.

5.6. Risk and Threat Monitoring

While following up on the existing risks and the planned treatments, new threat intelligence information emerges about a new risk origin exploiting a zero-day vulnerability for profit. The vulnerability exists in one of the public-facing applications. Thus, according to the framework, we re-conduct workshops two to five:
  • Threat Assessment/Risk Origins: The new risk origin (RO-05) is an organized crime group. RO-05 has a lucrative objective to deploy ransomware, hold data captive, and blackmail by re-selling organizations’ data. RO-05 is assessed as highly motivated with significant resources.
  • Strategic Scenarios: The ecosystem stakeholders are still the same. However, they are separate since the threat intelligence information specifies that RO-05 relies on a direct attack path. Figure 7 presents the corresponding strategic scenario. The impact of this scenario is assessed as critical since the vulnerability has been proven to exist in the public-facing application.
    Figure 7. Strategic scenario of the newly identified risk origin.
  • Operational Scenarios: Operational threat intelligence about the risk origin reveals the following potential operational scenario; after actively scanning the public-facing systems, RO-05 can identify the used vulnerable application. RO-05 has to develop and customize an exploit and ransomware. After exploitation, a command and control server connection is established to enumerate the internal network and environment. After propagation and lateral movement through internal services, the ransomware is executed. It infects the majority of the internal systems and exfiltrates data through encrypted channels. Then, existing data are encrypted, and a ransom is demanded. Figure 8 presents the operational scenario of the newly identified risk origin. The likelihood of this attack path is assessed as nearly certain.
    Figure 8. Operational scenario of the newly identified risk origin.
  • Risk Treatment: The newly identified risk (R-05) is that an organized crime can sabotage Internet gateway services for lucrative purposes. To remediate this risk, the treatment plan is modified as follows:
    • New treatment TR-08 to implement new rules on the firewall to detect any abuse of the vulnerable services. Priority: high.
    • Modify TR-03 priority from medium to high to ensure the detection of anomalies for zero-day vulnerabilities until patches are released.
    • Modify TR-05 priority from medium to low since more demanding actions are required.

6. Framework Evaluation

The application of the proposed framework demonstrates multiple enhancements over EBIOS, addressing new gaps not covered by the existing frameworks, though it still has certain limitations.

6.1. Enhancements over EBIOS

The application that was conducted using the proposed modifications to EBIOS Risk Manager has enhanced the quality of the risk management output. Traditional EBIOS Risk Manager relies on generic threat trend identification, potentially missing specific threats crucial to an organization. This could lead to inaccurate risk assessments. Additionally, it cannot trigger a re-execution of the risk management process based on incoming threat intelligence, potentially resulting in delayed or ineffective risk responses.
The proposed improvements result in a more agile and responsive process based on cyber threat intelligence information. Notably, in workshop two, risk origins are now identified based on threat intelligence information that is directly relevant to the organization’s context, improving the accuracy beyond the generic threat trend identification used in traditional EBIOS.
Additionally, workshops three and four benefit from strategic and operational threat intelligence information related to identified risk origins. Extending the traditional EBIOS Risk Manager approach, the integrated threat intelligence data leads to more accurate and realistic risk scenarios, ultimately improving risk assessments and treatment strategies. A significant addition is introducing the “Risks and Threat Monitoring” phase. Unlike EBIOS Risk Manager, this phase ensures ongoing risk visibility and integrates threat intelligence information. This enables the framework to trigger the re-execution of the risk management process based on incoming threat intelligence, allowing for timely and agile adaptation of risk responses and re-prioritization of risk treatments.
Table 10 summarizes the enhancements in the proposed framework over EBIOS Risk Manager by integrating the cyber threat intelligence process.
Table 10. Enhancements in the proposed framework over EBIOS.

6.2. Comparative Analysis

As presented in Table 1, while existing frameworks incorporate parts of risk management integrating threat intelligence, the full integration of all types of threat intelligence with the capability to adjust risks based on new intelligence is still not addressed. Our proposed framework, based on EBIOS’s comprehensive risk assessment, supports threat assessment, risk, and threat monitoring by integrating cyber threat intelligence, including strategic, tactical, operational, and technical types, with the capability to adjust based on new threat intelligence inputs.
EBIOS [21] and the Hybrid Model for Risk Assessment [43,44], while they account for threat actors’ assessment, they lack the integration of threat intelligence. The Hybrid Dynamic Risk Analysis [45] does not explicitly integrate threat intelligence in the risk assessment. Although it dynamically considers new technical information, mainly vulnerabilities, to adapt to analyzed risks, it does not account for other types of new threat intelligence information. SAIF [46] and the Unified Approach Model [47] integrate threat intelligence in cyber risk management but without addressing the adaptation of risks based on new threat intelligence. For instance, the approach of SAIF [46] can be used in phases three and four of our proposed framework to ensure the incorporation of the MITRE knowledge base in the definition of scenarios. The proposed framework in [48] drives a national risk assessment based on a national vulnerabilities inventory. It accounts for threat intelligence and risk adaptions but is only based on new technical vulnerability intelligence information. TIBSA [49] proposes a threat-informed decision-making methodology without a systematic risk management process.

6.3. Limitations

Despite these notable enhancements, it is crucial to recognize several limitations. The conceptual enhancements to EBIOS Risk Manager require further technical implementation and specifications. Resource intensity can be a challenge, as the continuous integration of threat intelligence may require additional personnel and technology resources, posing difficulties for smaller organizations with limited means. Expertise in interpreting and applying threat intelligence data is paramount for maximizing the framework’s benefits but may not be readily accessible to all organizations. Concerns related to scalability and sustainability over time warrant careful consideration. In addition, training is essential to make the most of available threat data. Successful adoption of the framework hinges on addressing these limitations and ensuring its long-term effectiveness.

7. Conclusions and Future Work

Organizations are facing imminent and persistent cyber adversaries. Existing cyber risk management frameworks often lack the agility and efficiency to anticipate these threats and protect their digital assets proactively. To address these challenges, this paper has introduced a novel approach to cyber risk management that integrates cyber threat intelligence, ultimately enhancing the organization’s ability to anticipate and respond to emerging threats. We conducted an overview of the existing works in both cyber risk management and cyber threat intelligence. A significant gap is identified in current risk management practices, particularly in the lack of considering valuable cyber threat intelligence information. The proposal is to create a new framework that bridges this gap and overcomes these limitations. By integrating the threat intelligence process with EBIOS Risk Manager, we developed a robust and agile risk management framework capable of adapting to emerging cyber threats. We applied the designed framework within a critical telecommunications infrastructure context to validate its effectiveness. The results demonstrated a promising risk management framework driven by cyber threat intelligence data.
In future work, we will extend the proposed enhancements to EBIOS based on STIX feeds. Moreover, we will incorporate this research proposal in the blockchain-based framework [32] to provide a complete collaborative threat intelligence-driven risk management framework while ensuring risk security and privacy, offering risk visibility on the national level and capitalizing on efficient common national threat anticipation. Further applications, case studies, and research can also focus on refining and extending the proposed framework to suit various industry-specific contexts. Another promising area for research is the development of standardized methodologies for measuring the effectiveness of threat intelligence integration within risk management practices.

Author Contributions

H.E.A. conceived and designed the proposed framework, conducted the meetings related to the framework application, and drafted the manuscript. A.E.S. and L.O. contributed to supervising the work along with writing and revising the manuscript. M.C. and A.F. critically revised the manuscript for important intellectual content. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Data sharing is not applicable to this article as no datasets were generated or analyzed during the current study.

Conflicts of Interest

The authors declare that they have no competing interests. Therefore, no known competing financial interests or personal relationships could have appeared to influence the work reported in this paper.

References

  1. IBM. Cost of a Data Breach Report 2023. Available online: https://www.ibm.com/security/digital-assets/cost-data-breach-report/ (accessed on 31 May 2024).
  2. Shevchenko, P.V.; Jang, J.; Malavasi, M.; Peters, G.W.; Sofronov, G.; Trück, S. The nature of losses from cyber-related events: Risk categories and business sectors. J. Cybersecur. 2023, 9, tyac016. [Google Scholar] [CrossRef]
  3. Ahmad, A.; Maynard, S.B.; Desouza, K.C.; Kotsias, J.; Whitty, M.T.; Baskerville, R.L. How can organizations develop situation awareness for incident response: A case study of management practice. Comput. Secur. 2021, 101, 102122. [Google Scholar] [CrossRef]
  4. Verizon. 2024 Data Breach Investigations Report. Available online: https://enterprise.verizon.com/resources/reports/dbir/ (accessed on 31 May 2024).
  5. Gartner. Forecast: Information Security and Risk Management, Worldwide, 2021–2027, 2Q23 Update. Available online: https://www.gartner.com/en/documents/4488199 (accessed on 31 May 2024).
  6. Bederna, Z.; Szádeczky, T. Managing the financial impact of cybersecurity incidents. Secur. Def. Q. 2023, 41, 15–35. [Google Scholar] [CrossRef]
  7. Freeman, C.F.; Lewis, R. Bridging the gap between cyber risk management and cyber threat intelligence. Comput. Secur. 2017, 66, 1–9. [Google Scholar]
  8. Samtani, S.; Abate, M.; Benjamin, V.; Li, W. Cybersecurity as an industry: A cyber threat intelligence perspective. In The Palgrave Handbook of International Cybercrime and Cyberdeviance; Spinger: Berlin/Heidelberg, Germany, 2020; pp. 135–154. [Google Scholar]
  9. Mizrak, F. Integrating Cybersecurity Risk Management into Strategic Management: A Comprehensive Literature Review. Res. J. Bus. Manag. 2023, 10, 98–108. [Google Scholar] [CrossRef]
  10. Kotsias, J.; Ahmad, A.; Scheepers, R. Adopting and integrating cyber-threat intelligence in a commercial organisation. Eur. J. Inf. Syst. 2023, 32, 35–51. [Google Scholar] [CrossRef]
  11. Akyeşilmen, N. Cybersecurity and Cyberwar: What Everyone Needs to Know. Cyberpolitik J. 2016, 1, 368–372. [Google Scholar]
  12. Oltsik, J.; Poller, J. Automation and Analytics versus the Chaos of Cybersecurity Operations. ESG MCAFEE 2017.
  13. Ferreira, D.J.; Mateus-Coelho, N.; Mamede, H.S. Methodology for Predictive Cyber Security Risk Assessment (PCSRA). Procedia Comput. Sci. 2023, 219, 1555–1563. [Google Scholar] [CrossRef]
  14. Cheimonidis, P.; Rantos, K. Dynamic Risk Assessment in Cybersecurity: A Systematic Literature Review. Future Internet 2023, 15, 324. [Google Scholar] [CrossRef]
  15. Giuca, O.; Popescu, T.M.; Popescu, A.M.; Prostean, G.; Popescu, D.E. A Survey of Cybersecurity Risk Management Frameworks. In Proceedings of the International Workshop Soft Computing Applications; Springer: Berlin/Heidelberg, Germany, 2018; pp. 240–272. [Google Scholar]
  16. Ionita, D. Current Established Risk Assessment Methodologies and Tools. Master’s Thesis, University of Twente, Enschede, The Netherlands, 2013. [Google Scholar]
  17. Lambrinoudakis, C.; Gritzalis, S.; Xenakis, C.; Katsikas, S.; Karyda, M.; Tsochou, A.; Papadatos, K.; Rantos, K.; Pavlosoglou, Y.; Gasparinatos, S.; et al. Compendium of Risk Management Frameworks with Potential Interoperability: Supplement to the Interoperable EU Risk Management Framework Report; European Union Agency for Cybersecurity (ENISA): Athens, Greece, 2022.
  18. ISO/IEC 27005: 2018; Information Technology. Security Techniques. Information Security Risk Management. International Organization for Standardization: Geneva, Switzerland, 2018.
  19. Initiative, J.T.F.T. Guide for Conducting Risk Assessments; Technical Report NIST SP 800-30r1; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2012. [CrossRef]
  20. Caralli, R.; Stevens, J.; Young, L.; Wilson, W. Introducing OCTAVE Allegro: Improving the Information Security Risk Assessment Process; Technical Report CMU/SEI-2007-TR-012; Software Engineering Institute, Carnegie Mellon University: Pittsburgh, PA, USA, 2007. [Google Scholar]
  21. Agence Nationale de la Sécurité des Systèmes d’Information. La Méthode EBIOS Risk Manager—Le Guide; Technical Report ANSSI-PA-048-EN; Agence Nationale de la Sécurité des Systèmes d’Information: Paris, France, 2019. [Google Scholar]
  22. Mathey, F.; Bonhomme, C.; Rocha, J.; Lombardi, J.; Joly, B. Risk Assessment Optimisation with MONARC. Available online: https://www.monarc.lu/assets/files/publications/2018-HACK.LU-CASES.pdf (accessed on 31 May 2024).
  23. BSI-Standard 200-2: IT-Grundschutz-Methodology. Available online: https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Grundschutz/International/bsi-standard-2002_en_pdf.html (accessed on 4 February 2023).
  24. European Commission Directorate-General for Communication. Security Standards Applying to All European Commission Information Systems: EU ITSRM, IT Security Risk Management Methodology V1.2. 2020. Available online: https://ec.europa.eu/info/publications/security-standards-applying-all-european-commission-information-systems_en (accessed on 31 May 2024).
  25. Information Security Forum. Security Standards Applying to All European Commission, ISF, Information RISK Assessment Methodology 2 (IRAM2). Available online: https://www.securityforum.org/solutions-and-insights/information-risk-assessment-methodology-2-iram2/ (accessed on 31 May 2024).
  26. Brunner, M.; Sillaber, C.; Breu, R. Towards automation in information security management systems. In Proceedings of the 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS), Prague, Czech Republic, 25–29 July 2017; pp. 160–167. [Google Scholar]
  27. Schmitz, C.; Pape, S. LiSRA: Lightweight security risk assessment for decision support in information security. Comput. Secur. 2020, 90, 101656. [Google Scholar] [CrossRef]
  28. Akinrolabu, O.; New, S.; Martin, A. CSCCRA: A Novel Quantitative Risk Assessment Model for SaaS Cloud Service Providers. Computers 2019, 8, 66. [Google Scholar] [CrossRef]
  29. Poletykin, A. Cyber security risk assessment method for SCADA of industrial control systems. In Proceedings of the 2018 International Russian Automation Conference (RusAutoCon), Sochi, Russia, 9–16 September 2018; pp. 1–5. [Google Scholar]
  30. Lee, I. Internet of Things (IoT) cybersecurity: Literature review and IoT cyber risk management. Future Internet 2020, 12, 157. [Google Scholar] [CrossRef]
  31. Ma, S.; Hao, W.; Dai, H.N.; Cheng, S.; Yi, R.; Wang, T. A Blockchain-Based Risk and Information System Control Framework. In Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), Athens, Greece, 12–15 August 2018; pp. 106–113. [Google Scholar] [CrossRef]
  32. El Amin, H.; Oueidat, L.; Chamoun, M.; Samhat, A.E.; Feghali, A. Blockchain-based multi-organizational cyber risk management framework for collaborative environments. Int. J. Inf. Secur. 2023, 23, 1231–1249. [Google Scholar] [CrossRef]
  33. Shin, B.; Lowry, P.B. A review and theoretical explanation of the ‘Cyberthreat-Intelligence (CTI) capability’ that needs to be fostered in information security practitioners and how this can be accomplished. Comput. Secur. 2020, 92, 101761. [Google Scholar] [CrossRef]
  34. Hutchins, E.M.; Cloppert, M.J.; Amin, R.M. Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. Lead. Issues Inf. Warf. Secur. Res. 2011, 1, 80. [Google Scholar]
  35. Caltagirone, S.; Pendergast, A.; Betz, C. The diamond model of intrusion analysis. Threat Connect 2013, 298, 1–61. [Google Scholar]
  36. Bianco, D. The Pyramid of Pain. 2013. Available online: https://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html (accessed on 31 May 2024).
  37. Strom, B.E.; Applebaum, A.; Miller, D.P.; Nickels, K.C.; Pennington, A.G.; Thomas, C.B. Mitre Att&ck: Design and Philosophy; Technical report; The MITRE Corporation: McLean, VA, USA, 2018. [Google Scholar]
  38. Barnum, S. Standardizing Cyber Threat Intelligence Information with the Structured Threat Information Expression (Stix); MITRE Corporation: McLean, VA, USA, 2012; Volume 11, pp. 1–22. [Google Scholar]
  39. Connolly, J.; Davidson, M.; Schmidt, C. The Trusted Automated Exchange of Indicator Information (Taxii); The MITRE Corporation: McLean, VA, USA, 2014; pp. 1–20. [Google Scholar]
  40. Filigran—OpenCT—Open Platform for Cyber Threat Intelligence. Available online: https://www.filigran.io/en/products/opencti/ (accessed on 4 February 2023).
  41. Wagner, C.; Dulaunoy, A.; Wagener, G.; Iklody, A. Misp: The design and implementation of a collaborative threat intelligence sharing platform. In Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, Vienna, Austria, 24 October 2016; pp. 49–56. [Google Scholar]
  42. Army, A. Land Warfare Doctrine LWD 2-0 intelligence; The Australian Government Department of Defence: Canberra, Australia, 2014.
  43. Haji, S.; Tan, Q.; Costa, R.S. A Hybrid Model for Information Security Risk Assessment. Int. J. Adv. Trends Comput. Sci. Eng. 2019, 8, 100–106. [Google Scholar] [CrossRef]
  44. Ahmed, M.; Panda, S.; Xenakis, C.; Panaousis, E. MITRE ATT&CK-driven cyber risk assessment. In Proceedings of the 17th International Conference on Availability, Reliability and Security, Vienna, Austria, 23–26 August 2022; pp. 1–10. [Google Scholar]
  45. Lyvas, C.; Maliatsos, K.; Menegatos, A.; Giannakopoulos, T.; Lambrinoudakis, C.; Kalloniatis, C.; Kanatas, A. A hybrid dynamic risk analysis methodology for cyber-physical systems. In Proceedings of the European Symposium on Research in Computer Security; Springer: Berlin/Heidelberg, Germany, 2022; pp. 134–152. [Google Scholar]
  46. Belfadel, A.; Boyer, M.; Letailleur, J.; Petiot, Y.; Yaich, R. Towards a Security Impact Analysis Framework: A Risk-Based and MITRE Attack Approach. In Proceedings of the European Symposium on Research in Computer Security; Springer: Berlin/Heidelberg, Germany, 2022; pp. 212–227. [Google Scholar]
  47. Kure, H.; Islam, S. Cyber threat intelligence for improving cybersecurity and risk management in critical infrastructure. J. Univers. Comput. Sci. 2019, 25, 1478–1502. [Google Scholar]
  48. Janiszewski, M.; Felkner, A.; Lewandowski, P. A novel approach to national-level cyber risk assessment based on vulnerability management and threat intelligence. J. Telecommun. Inf. Technol. 2019, 2, 5–14. [Google Scholar] [CrossRef]
  49. Dekker, M.; Alevizos, L. A Threat-Intelligence Driven Methodology to Incorporate Uncertainty in Cyber Risk Analysis and Enhance Decision Making. arXiv 2023, arXiv:2302.13082. [Google Scholar] [CrossRef]
  50. Hevner, A.R.; March, S.T.; Park, J.; Ram, S. Design science in information systems research. MIS Q. 2004, 28, 75–105. [Google Scholar] [CrossRef]
  51. Alnajim, O.A.; Kautzman, D.M. Towards a conceptual cyber risk assessment framework for healthcare systems. Procedia Comput. Sci. 2017, 121, 785–792. [Google Scholar]
  52. Buczak, A.L.; Guven, E. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 2016, 18, 1153–1176. [Google Scholar] [CrossRef]
  53. ANSSI. EBIOS Risk Manager: Going Further; Technical Report; ANSSI: Paris, France, 2019; Version 1.0.
  54. Abbass, W.; Baina, A.; Bellafkih, M. Using EBIOS for risk management in critical information infrastructure. In Proceedings of the 2015 5th World Congress on Information and Communication Technologies (WICT), Marrakech, Morocco, 14–16 December 2015; pp. 107–112. [Google Scholar]
  55. Zahra, B.F.; Abdelhamid, B. Risk analysis in Internet of Things using EBIOS. In Proceedings of the 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 9–11 January 2017; pp. 1–7. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.