Threat Intelligence Standard

Overview

Threat Intelligence Standard is built into the core Secure60 platform.

Built-in Threat Intelligence

Our Built-in Threat Intelligence leverages a combination of open-source and private data sources to provide a robust foundation of threat information. This includes:

Features

Getting Started

To start using Threat Intelligence in Secure60, follow these steps:

  1. Enable Built-in Threat Intelligence:

    • Threat Intelligence is enabled on each Project by default
    • To managed settings, Navigate to the Threat Intelligence settings in the Secure60 portal (Project Settings page under “Modules”)
    • You can tune features such as score of Threats detected, Adding items to Allow Lists and more
  2. System Behaviour

    • The platform will look at the ip_src_address and ip_dst_address fields in incoming data and match against IP intelligence lists
    • When a match is found an Entity is created with the IP address in question with a score of 100
    • Entity based rules detect an Entity with a high score and will create a threat object (and run appropriate Response actions)
    • When a detection is made for a specific Entity. We add that entity to a supression list for 24hrs to avoid floods of alerts for a specifc Entity Object

Configuration Options

Fields that are available to configure:

The solution comes configured with smart settings by default to avoid noise and overload. Example configurations built in:

Back to top