evaluating-threat-intelligence-platforms
SKILL.md
Evaluating Threat Intelligence Platforms
When to Use
Use this skill when:
- Conducting a formal RFP or vendor evaluation for a TIP solution
- Assessing whether the current TIP (e.g., MISP) needs to be replaced or augmented as the CTI program scales
- Establishing evaluation criteria aligned to organizational maturity and budget
Do not use this skill for evaluating feed quality independently of the TIP — feed evaluation is a separate workflow focused on data quality rather than platform capabilities.
Prerequisites
- Documented CTI program requirements: team size, feed sources, integration targets, use cases
- Budget range and procurement timeline
- Technical staff who will administer the platform (Python/API experience for open-source TIPs)
- List of current and planned integrations (SIEM, SOAR, EDR, firewalls)
Workflow
Step 1: Define Evaluation Criteria
Structure requirements into mandatory (M) and desired (D) categories:
Core TIP Functions:
- M: STIX 2.1 import/export with TAXII 2.1 server
- M: REST API for automated IOC ingestion and export
- M: Indicator deduplication and TTL management
- M: TLP classification enforcement
- D: Built-in MITRE ATT&CK integration and technique tagging
- D: Graph visualization of indicator relationships
- D: Workflow automation for analyst triage
Integrations:
- M: SIEM integration (Splunk, Sentinel, QRadar) via syslog, API, or native connector
- M: EDR integration for IOC push (CrowdStrike, Defender, SentinelOne)
- D: SOAR integration (XSOAR, Splunk SOAR) for playbook triggers
- D: Ticketing system (ServiceNow, Jira) for intelligence task tracking
Operational:
- M: Role-based access control with TLP-aware data segregation
- M: Audit logging for all analyst actions
- D: Multi-tenancy for MSSP use cases
Step 2: Evaluate Major TIP Options
MISP (Open Source):
- Cost: Free (self-hosted infrastructure cost only)
- Strengths: Largest community, 250+ modules, extensive ISAC usage, STIX 2.0 native
- Weaknesses: Requires dedicated admin, limited visualization, UI dated
- Best for: Budget-constrained teams with technical staff; government/ISAC sharing programs
OpenCTI (Open Source):
- Cost: Free (self-hosted); paid SaaS at ~$3,000–$15,000/year
- Strengths: Native STIX 2.1, graph visualization, ATT&CK integration, modern API
- Weaknesses: Resource-intensive deployment (Elasticsearch, MinIO required)
- Best for: Teams wanting open source with modern UX; SOC/CTI integration focus
ThreatConnect (Commercial):
- Cost: $50,000–$500,000/year depending on scale
- Strengths: End-to-end CTI lifecycle, playbook automation, TC Exchange marketplace, analyst workflow
- Weaknesses: High cost; complex implementation; best value at larger scale
- Best for: Mature enterprise CTI programs; MSSPs; red team/blue team integration
Anomali ThreatStream (Commercial):
- Cost: $30,000–$200,000/year
- Strengths: Strong feed aggregation, Splunk-native integration, extensive pre-built connectors
- Weaknesses: Graph visualization weaker than OpenCTI; UI refresh lagging
- Best for: Splunk-heavy environments; teams prioritizing feed volume over analysis workflows
EclecticIQ Platform (Commercial):
- Cost: $40,000–$300,000/year
- Strengths: STIX 2.1 native, collaborative intelligence workbench, strong European customer base
- Weaknesses: Smaller partner ecosystem than ThreatConnect
- Best for: Teams with MITRE ATT&CK-centric workflows; EMEA-focused organizations
Step 3: Conduct Proof of Concept
Request 30-day PoC from finalists. Test:
- Feed onboarding: Can your top 5 feeds be ingested within 4 hours?
- SIEM integration: Can enriched IOCs push to your SIEM in <5 minutes?
- ATT&CK mapping: Can analysts tag indicators with ATT&CK techniques efficiently?
- Report generation: Can the platform produce a tactical IOC bulletin with one click?
- API performance: Can the REST API handle 10,000 indicator queries per day?
Step 4: Score and Select
Use weighted scoring matrix (weight each criterion by organizational priority):
Criterion Weight Vendor A Vendor B
STIX 2.1 compliance 20% 95 85
SIEM integration 25% 90 70
ATT&CK mapping 15% 85 95
Cost (inverse) 20% 60 90
UI/analyst experience 10% 80 75
Vendor support quality 10% 85 80
TOTAL 100% 82.0 81.5
Step 5: Implementation and Onboarding Planning
Plan 90-day implementation:
- Week 1–2: Infrastructure deployment (cloud or on-prem)
- Week 3–4: Feed onboarding and deduplication tuning
- Week 5–6: SIEM/SOAR integration and testing
- Week 7–8: Analyst workflow configuration and training
- Week 9–12: Operational validation and go-live
Key Concepts
| Term | Definition |
|---|---|
| TIP | Threat Intelligence Platform — software for collecting, processing, analyzing, and disseminating cyber threat intelligence |
| TAXII Server | Component of a TIP that serves STIX bundles to consuming systems on request |
| TC Exchange | ThreatConnect's commercial marketplace for pre-built feed integrations and app connectors |
| Multi-tenancy | TIP capability to serve multiple organizational units or customers with isolated data environments |
| Deduplication | Process of identifying and merging duplicate indicators within a TIP to reduce analyst noise |
Tools & Systems
- MISP: Open-source TIP used by 6,000+ organizations; strongest ISAC/government community integration
- OpenCTI: Modern open-source TIP with native STIX 2.1 and graph-based analysis
- ThreatConnect: Enterprise commercial TIP with lifecycle management and SOAR playbook integration
- Anomali ThreatStream: Commercial TIP with strong Splunk ecosystem integration
- EclecticIQ: Commercial TIP with ATT&CK-centric workflow design
Common Pitfalls
- Selecting TIP before defining requirements: Technology selection before use case definition leads to expensive mismatches.
- Underestimating administration burden: MISP and OpenCTI require dedicated admin time (minimum 0.25 FTE); budget accordingly.
- Ignoring data migration costs: Moving historical intelligence from one TIP to another is costly and often impractical for legacy systems.
- Not testing SIEM integration in PoC: TIP value depends heavily on downstream integration quality; always test SIEM/SOAR connectivity during evaluation.
Weekly Installs
1
Repository
mukul975/anthro…y-skillsGitHub Stars
2.4K
First Seen
2 days ago
Security Audits
Installed on
amp1
cline1
opencode1
cursor1
kimi-cli1
kiro-cli1