hydden.docs

#

Threat detection rules are sets of predefined criteria and conditions used to identify potential security threats within a system or network.

What does your score mean?

Hydden uses threat rules to generate threat scores for every discovered account regardless of account type. Hydden shows threat scores as percentages whereby a low percentage indicates a low risk, and a high percentage indicates a high risk.

How was it calculated?

Every rule and category is weighted between 0 and 10 (0 = off, 10 = max). If a category weight is set to zero, all the rules within that category are automatically weighted as zero.

Aggregation rules combine each threat rule that matches on an account to produce a total threat score for each account. Additional aggregation rules then combine the total threat score for each account to produce both identity and tenant level threat scores.

Tips to Improve Your Score

Use the Search Library to run reports with filters to identify categories and/or individual rules that negatively impact each account.

Targeting rules and categories with the highest values will have the greatest impact on reducing the threat scores. Working backwards from identities with high threat scores, to accounts with high threat scores then categories with high threat scores will enable you to identity the most impactful rules quicker.

Concepts of Threat Detection and Rules in General

- not Hydden specific -

How Threat Detection Rules Work

Types of Threat Detection Rules

Threat Scoring Overview

Threat scoring is a method for quantifying the potential impact and likelihood of a specific threat to an organization. It assigns a numerical value or rating to threats, allowing security teams to prioritize their response efforts.

Key Components of Threat Scoring

Factors Affecting Threat Score

Several factors contribute to a threat’s score, including:

Benefits of Threat Scoring

By assigning numerical values to threats, organizations can more effectively allocate resources, measure the effectiveness of security controls, and reduce overall risk.

Threat Rule Sets

Threat rule sets are collections of predefined threat detection rules grouped together for a specific purpose or target. They provide a structured approach to managing and organizing threat detection logic.

Purpose of Threat Rule Sets

Examples of Threat Rule Sets

Benefits of Using Threat Rule Sets

Rule Scores and Rule Set Weighting

Rule Scores

In threat detection systems, rule scores are typically a numerical value assigned to a threat detection rule to indicate its potential severity or impact. This score is often used to prioritize alerts and incidents.

Rule scores are determined based on various factors, including:

Rule Set Weighting

Rule set weighting involves assigning different levels of importance to different groups of threat detection rules. This allows for a more nuanced approach to threat prioritization.

By assigning weights to rule sets, organizations can better allocate resources and focus on mitigating the most significant risks.

Example

A rule set targeting advanced persistent threats (APTs) might have a higher weight than a rule set detecting spam emails. Within an APT rule set, rules detecting lateral movement might have higher scores than rules detecting initial compromise.

Benefits of Rule Scores and Rule Set Weighting

Threat Aggregation

Threat aggregation is the process of collecting, consolidating, and analyzing threat data from multiple sources into a unified view. This involves gathering information about potential threats, vulnerabilities, and risks from various systems, networks, and security tools. Essentially, threat aggregation provides a holistic view of an organization’s security posture, enabling security teams to make informed decisions and proactively protect against threats.

Key Components of Threat Aggregation

Benefits of Threat Aggregation

Manual Threat Rules

Manual threat rules are the knowledge and experience of security analysts and experts applied to identify and respond to potential threats. Unlike automated threat detection rules, which rely on predefined patterns and algorithms, manual rules involve human judgment and analysis.

Key Characteristics of Manual Threat Rules

When to Use Manual Threat Rules

Challenges of Manual Threat Rules

While manual threat rules are for handling complex threats and providing expert insights, they are often complemented by automated rules to improve efficiency and scalability.