Signal vs. Noise: Actionable Intelligence
AUTHOR: Nick Southern | CLASS: Unclassified
// THE DATA PROBLEM
A SIEM ingesting 500GB of logs a day isn’t a defense strategy; it’s a haystack. The most common failure mode in modern SOCs is “Alert Fatigue.” Analysts burn out chasing false positives while the real adversary moves laterally, undetected.
To pivot from Reactive to Proactive, we must stop collecting “Data” and start generating “Intelligence.”
// THE PYRAMID OF PAIN
Not all Indicators of Compromise (IOCs) are created equal. I align my threat hunting strategy with David Bianco’s Pyramid of Pain:
-
[LEVEL 1] Hash Values & IP Addresses:
Easy to block, but trivial for attackers to change. This is “Whack-a-Mole.” -
[LEVEL 2] TTPs (Tactics, Techniques, and Procedures):
The gold standard. If we detect how they operate (e.g., PowerShell injection, Pass-the-Hash), we cripple their entire campaign, not just one tool.
// MAPPING TO MITRE ATT&CK
Alerts without context are useless. Every high-fidelity alert in my stack is mapped to a MITRE ID. This allows us to answer the CISO’s question: “Where are we vulnerable?”
>> MITRE_ID: T1059.001 (Command and Scripting Interpreter)
>> TACTIC: Execution
>> ACTION: Isolate Host & Dump RAM for Forensics.
// THE “SO WHAT?” FACTOR
As a Manager, my job is translation. The Board does not care about “Malicious IPs.” They care about Business Risk.
Bad Report: “We blocked 40,000 bad packets from Russia.” (Meaningless noise).
Good Report: “We identified a targeted campaign attempting to harvest credentials from our Finance Dept. Controls held, no data was exfiltrated.” (Strategic Signal).
Intelligence is not about knowing everything. It is about knowing the right thing, at the right time, to make the right decision.