Automate Threat Alert Sharing between ISACs or Organizations for Real-time Collective Defense
Cyware Situational Awareness Platform (CSAP) • Oct 5, 2020
We use cookies to improve your experience. Do you accept?
Cyware Situational Awareness Platform (CSAP) • Oct 5, 2020
Threat information sharing has become an integral part of modern security operations, allowing sharing participants to leverage collective knowledge, experience, and capabilities to counter the most relevant threats. Going one step further, Cyware Situational Awareness Platform (CSAP) version 2.7 now allows two different ISACs or organizations using CSAP to fully automate the sharing of alerts between themselves.
How can ISACs and Enterprises benefit from this?
How does it work?
As a first step, CSAP Admins need to configure the API credentials of their sharing partners within the Integrations sections of the CSAP Dashboard.
Thereafter, the CSAP Admins can define rules to trigger automated sharing of specific Alerts with their sharing partners. The rules can be defined as per the individual or combination of several parameters including TLP, Alert Category, or Information Source, as the need may be.
Admins can also define rules to block the sharing of specific types of alerts such as TLP Red alerts to prevent any accidental disclosure of sensitive information.
CSAP Admins can also configure the automation rules to enable direct sharing of Alerts, received from other ISACs or organizations, with their members or choose to save the received Alerts for review and enrichment.
**The bottom line **
Every ISAC or organization possesses insights and learnings based on the frequently occurring threats in their domain. By effectively automating the sharing of threat alerts in real-time, ISACs and enterprises can collaborate with their partner ISACs or vendors/peers respectively, and take the first step towards an extended collective-defense security strategy.