You can then check if the extracted values match the expected entities and relationships.
+
Partial test
+
The test conducted in this window relies only on the translation of CSV data according to the chosen representation in the mapper. It does not take into account checks for accurate entity formatting (e.g. IPv4) or specific entity configurations (e.g. mandatory "description" field on reports). Consequently, the entities visible in the test window may not be created during the actual import process.
+
+
Test with a small file
We strongly recommend limiting test files to 100 lines and 1MB. Otherwise, the browser may crash.
Use a mapper for importing a CSV file
-
You can change the default configuration of the import csv connector in your configuration file.
+
You can change the default configuration of the import csv connector in your configuration file.
In Data import section, or Data tab of an entity, when you upload a CSV, you can select a mapper to apply to the file.
The file will then be parsed following the representation rules set in the mapper.
By default, the imported elements will be added in a new Analyst Workbench where you will be able to check the result of the import.
Data segregation in the context of Cyber Threat Intelligence refers to the practice of categorizing and separating different types of data or information related to cybersecurity threats based on specific criteria.
+
Marking restriction
+
Data segregation in the context of Cyber Threat Intelligence refers to the practice of categorizing and separating different types of data or information related to cybersecurity threats based on specific criteria.
This separation helps organizations manage and analyze threat intelligence more effectively and securely and the goal of data segregation is to ensure that only those individuals who are authorized to view a particular set of data have access to that set of data.
Practically, "Need-to-know basis" and "classification level" are data segregation measures.
-
Marking Definitions
-
Description
-
Marking definitions are essential in the context of data segregation to ensure that data is appropriately categorized and protected based on its sensitivity or classification level. Marking definitions establish a standardized framework for classifying data.
+
Description
+
Marking definitions are essential in the context of data segregation to ensure that data is appropriately categorized and protected based on its sensitivity or classification level. Marking definitions establish a standardized framework for classifying data.
Marking Definition objects are unique among STIX objects in the STIX 2.1 standard in that they cannot be versioned. This restriction is in place to prevent the possibility of indirect alterations to the markings associated with a STIX Object.
Multiple markings can be added to the same object. Certain categories of marking definitions or trust groups may enforce rules that specify which markings take precedence over others or how some markings can be added to complement existing ones.
In OpenCTI, data is segregated based on knowledge marking. The diagram provided below illustrates the manner in which OpenCTI establishes connections between pieces of information to authorize data access for a user:
-
Traffic Light Protocol
-
The Traffic Light Protocol is implemented by default as marking definitions in OpenCTI. It allows you to segregate information by TLP levels in your platform and restrict access to marked data if users are not authorized to see the corresponding marking.
-
The Traffic Light Protocol (TLP) was designed by the Forum of Incident Response and Security Teams (FIRST) to provide a standardized method for classifying and handling sensitive information, based on four categories of sensitivity.
-
For more details, the diagram provided below illustrates how are categorized the marking definitions:
-
+
Manage markings
Create new markings
-
In order to create a marking, you must first have the ability to access the Settings tab. For example, a user who is in a group with the role of Administrator can bypass all capabilities or a user who is in a group with the role that has Access administration checked can access the Settings tab. For more details about user administration, please see the Users and Role Based Access Control page.
-
-
Once you have access to the settings, you can create a new marking in Security > Marking Definitions
-
A marking has:
+
To create a marking, you must first possess the capability Manage marking definitions. For further information on user administration, please refer to the Users and Role Based Access Control page.
+
Once you have access to the settings, navigate to "Settings > Security > Marking Definitions" to create a new marking.
+
A marking consists of the following attributes:
-
a type,
-
a definition,
-
a color, and
-
an order.
+
Type: Specifies the marking group to which it belongs.
+
Definition: The name assigned to the marking.
+
Color: The color associated with the marking.
+
Order: Determines the hierarchical order among markings of the same type.
-
Allowed marking definitions
-
In order for all users in a group to be able to see entities and relationships that have specific markings on them, allowed markings can be checked when updating a group:
-
+
Allowed marking
+
The configuration of authorized markings for a user is determined at the Group level. To access entities and relationships associated with specific markings, the user must belong to a group that has been granted access to those markings.
+
There are two ways in which markings can be accessed:
+
+
The user is a member of a group that has been granted access to the marking.
+
The user is a member of a group that has access to a marking of the same type, with an equal or higher hierarchical order.
+
+
+
Access to an object with several markings
+
Access to all markings attached to an object is required in order to access it (not only one).
+
+
+
Automatically grant access to the new marking
+
To allow a group to automatically access a newly created marking definition, you can check Automatically authorize this group to new marking definition.
+
Default marking definitions
-
To apply a default marking when creating a new entity or relationship, you can choose which marking to add by default from the list of allowed markings. You can add only one marking per type, but you can have multiple types.
+
To apply a default marking when creating a new entity or relationship, you can choose which marking to add by default from the list of allowed markings. You can add only one marking per type, but you can have multiple types. This configuration is also done at the Group level.
-
Be careful, add markings as default markings is not enough to see the markings when you create an entity or relationship, you need to enable default markings in an entity or relationship customization.
-
For example, if you create a new report, got to Settings > Customization > Report > Markings and click on Activate/Desactivate default values.
-
-
Authorize a group to new marking definition
-
To authorize a group to automatically have access to a newly created marking definition in allowed marking definitions, you can check Automatically authorize this group to new marking definition when update a group:
-
-
Behavior on the OpenCTI Platform
-
Create a new entity or relationship
-
When a new entity or a new relationship is created, if multiple markings of the same type and different order are added, the platform will only keep the highest order for each type.
+
+
Need a configuration change
+
Simply adding markings as default markings is insufficient to display the markings when creating an entity or relationship. You also need to enable default markings in the customization settings of an entity or relationship. For example, to enable default markings for a new report, navigate to "Settings > Customization > Report > Markings" and toggle the option to Activate/Desactivate default values.
+
+
Management of multiple markings
+
In scenarios where multiple markings of the same type but different orders are added, the platform will retain only the marking with the highest order for each type. This consolidation can occurs in various instances:
+
+
During entity creation, if multiple markings are selected.
+
During entity updates, whether manually or via a connector, if additional markings are introduced.
+
When multiple entities are merged, their respective markings will be amalgamated.
+
For example:
Create a new report and add markings PAP:AMBER,PAP:RED,TLP:AMBER+STRICT,TLP:CLEAR and a statement CC-BY-SA-4.0 DISARM Foundation
The final markings kept are: PAP:RED, TLP:AMBER+STRICT and CC-BY-SA-4.0 DISARM Foundation
-
Update an entity or a relationship
+
Update an object manually
When update an entity or a relationship:
add a marking with the same type and different orders, a pop-up will be displayed to confirm the choice,
@@ -4923,15 +4944,13 @@
Update an entity or a relationship
add a marking with different types, the marking will be added.
-
Merge entities
-
When you merge multiple entities, the platform will keep the highest order for each type of marking when the merge is complete:
-
For example, merging two observables, one with TLP:CLEAR and PAP:CLEAR, and the other one with PAP:RED and TLP:GREEN.
-
-
As a final result, you will have the observable with PAP:RED and TLP:GREEN.
-
-
Import data from a connector
-
When you import data from a connector, the connector cannot downgrade a marking for the same entity, if a same type of marking is set on it.
-
For example, if you create an observable existing in AlienVault data and set TLP:AMBER as the marking, when importing AlienVault data, the platform will keep the highest rank for the same type of markings.
+
Import data from a connector
+
As a result of this mechanism, when importing data from a connector, the connector is unable to downgrade a marking for an entity if a marking of the same type is already present on it.
+
Additional information
+
The Traffic Light Protocol is implemented by default as marking definitions in OpenCTI. It allows you to segregate information by TLP levels in your platform and restrict access to marked data if users are not authorized to see the corresponding marking.
+
The Traffic Light Protocol (TLP) was designed by the Forum of Incident Response and Security Teams (FIRST) to provide a standardized method for classifying and handling sensitive information, based on four categories of sensitivity.
+
For more details, the diagram provided below illustrates how are categorized the marking definitions:
A user without Max confidence level won't have the ability to create, delete or update any data in our platform. Please be sure that your users are always either assigned to group that have a confidence level defined or that have an override of this group confidence level.
+
Groups
Groups are the main way to manage permissions and data segregation as well as platform customization for the given users part of this group. You can manage the groups in Settings > Security > Groups.
Here is the description of the group available parameters.