Skip to the content.

Security Posture by Example

It is sometimes easier for some people to understand concepts by using examples. The intent is to show realistic scenarios of how posture attributes can be used as part of the business processes.

Amalgamated Example Company is a large corporate conglomerate with many business units in many industries.

The organization has a system of systems containing many devices, both virtual and physical. The organization has many security policies, a subset of which will be used in these examples. One corporate security policy is that the organization participates in the appropriate ISAC/ISAO's, both sharing and receiving threat information using STIX over TAXII. The organization received a STIX object from the ISAC/ISAO containing the Indicators of Compromise (IOCs) for a particular campaign by a particular threat actor. It also contained the underlying techniques used by the threat actor including the CVEs of the vulnerabilities being exploited.

Reception of this STIX object kicked off a CACAO playbook to evaluate the risk to the organization of this particular threat. From a parochial security posture viewpoint, the CACAO playbook can be over simplified to decision points and actions. For our examples the actions will be a set of Open Command & Control (OpenC2) commands which we will oversimplify with some descriptive comments. We will also oversimplify the control flow to just the security posture attributes used in the decision points and the PACE OpenC2 commands to obtain (“collect”, the “C” in PACE) and analyze (“evaluate”, the “E” in PACE) the attributes.

The organization has finite resources and the security policy on patching known vulnerabilities allows varying time periods to patch depending on the perceived risk of the vulnerability, calculated using risk quantification and value stream mapping. The security policy also allows for exceptions to this policy if the appropriate level of management authorizes the exception based on business needs. Therefore the organization knows it has unpatched vulnerabilities due to:

The CACAO playbook kicked off above will re-evaluate the security posture of all the organization’s devices based on posture attributes. Based on this re-evaluation and the organization’s security policies, for each device the CACAO playbook will:

The examples below will illustrate a sample of security posture attributes and their use in context. They make the most sense when read in order.

Scenario 1 - Overall Posture on the Corporate Dashboard

See Scenario 1

Scenario 2 - Back to Business as Usual

See Scenario 2

Scenario 3 - Different Back to Business as Usual

See Scenario 3

Scenario 4 - Heightened Threat, Automated Patch

See Scenario 4

Scenario 5 - Heightened Threat, Increased Monitoring

See Scenario 5

Scenario 6 - Heightened Threat, Start Threat Hunting

See Scenario 6

Scenario 7 - Active Attack, no known material consequences foreseen

See Scenario 7

Scenario 8 - Active Attack with material consequences

See Scenario 8

Scenario 9 - Software Development - reduce unplanned work

See Scenario 9

Scenario 10 - Software Development - architecture

See Scenario 10

Scenario 11 - Software Development - license

See Scenario 11

Scenario 12 - Software Development - Demming

See Scenario 12

Scenario 13 - Software Development - predictive

See Scenario 13

Scenario 14 - Build systems

See Scenario 14

Scenario 15 - Software Signatures

See Scenario 15

Scenario 16 - Software provenance and pedigree

See Scenario 16

Scenario 17 - Vendor trust

See Scenario 17

Scenario 18 - Mergers and Acquisitions - Sunny Day

See Scenario 18

Scenario 19 - Mergers and Acquisitions - Rainy Day

See Scenario 19

Scenario 20 - Known Unknowns

See Scenario 20

Scenario 21 - Ransomware

See Scenario 21

Scenario 22 - Attack on Crypto Exchange

See Scenario 22