
Sign up to save your podcasts
Or
In episode 70 of The Cyber5, we are joined by Open Source Context Director of Operations, Donald McCarthy.
We discuss external telemetry available to the private sector, focusing on passive domain name systems or passive DNS, and Border Gateway Protocol or BGP. These data sets are critical for threat intelligence teams, as they often provide crucial information on attacker infrastructure for the SOC. Still, they also help solve problems and provide context on a much broader scale.
Three Key Takeaways:
1) What is Passive DNS and how is it collected?
To simplify, passive DNS is a way of storing DNS resolution data so that security teams can reference past DNS record values to uncover potential security incidents or discover malicious infrastructures. Passive DNS is the historical phone book of the internet. Practitioners can collect it by:
2) What is Border Gateway Protocol (BGP)?
3) Use Cases for PDNS and BGP in the SOC:
4) Use Cases for PDNS and BGP outside of the SOC:
5) Enrichment is King and Does Not Need to Be Resource Intensive
If security teams are not engaging with the business to solve problems that risk revenue generation, data sets like PDNS or BGP do not matter. For example, if an organization does not control DNS at their borders, they will lose a lot of visibility to reduce risk and potentially give away proprietary information.
5
2323 ratings
In episode 70 of The Cyber5, we are joined by Open Source Context Director of Operations, Donald McCarthy.
We discuss external telemetry available to the private sector, focusing on passive domain name systems or passive DNS, and Border Gateway Protocol or BGP. These data sets are critical for threat intelligence teams, as they often provide crucial information on attacker infrastructure for the SOC. Still, they also help solve problems and provide context on a much broader scale.
Three Key Takeaways:
1) What is Passive DNS and how is it collected?
To simplify, passive DNS is a way of storing DNS resolution data so that security teams can reference past DNS record values to uncover potential security incidents or discover malicious infrastructures. Passive DNS is the historical phone book of the internet. Practitioners can collect it by:
2) What is Border Gateway Protocol (BGP)?
3) Use Cases for PDNS and BGP in the SOC:
4) Use Cases for PDNS and BGP outside of the SOC:
5) Enrichment is King and Does Not Need to Be Resource Intensive
If security teams are not engaging with the business to solve problems that risk revenue generation, data sets like PDNS or BGP do not matter. For example, if an organization does not control DNS at their borders, they will lose a lot of visibility to reduce risk and potentially give away proprietary information.