Threat profiling is a strategic approach to cybersecurity that focuses on understanding which threats are most relevant to your specific organization. Rather than attempting to defend against every possible threat, this framework helps prioritize resources by identifying:
Your organization’s crown jewels (most critical assets)
The threats most likely to target your specific industry and profile
The capabilities of potential adversaries
Where to allocate defensive resources for maximum risk reduction
Understanding Risk in Context
Risk Components
Risk in both traditional IT and industrial control systems (ICS/OT) consists of three core elements:
Component
Description
Threats
Actors with capability and intent to cause harm
Vulnerabilities
Weaknesses that can be exploited (e.g., Log4j)
Impact/Consequences
Financial loss, operational disruption, or loss of life
Resilience in Operational Technology
In OT (Operational Technology) environments, resilience takes on additional meaning beyond IT:
Key Insight: No amount of cybersecurity can prevent a pipe from breaking at 1000 PSI. Physical engineering controls remain essential.
The Value of Human Life in Risk Calculations
The U.S. government values human life at approximately $7 million per person for workplace accident calculations. While morbid, this metric enables quantitative risk assessment when evaluating safety investments.
The Diamond Model of Threat Analysis
Developed by Sergio Caltagirone (now VP at Dragos), the Diamond Model provides a framework for categorizing threats using four interconnected components:
Adversary: The threat actor (nation-state, criminal group, insider, hacktivist)
Victim: The target organization and its attributes
Capability: The tools, techniques, and procedures (TTPs) available to the adversary
Infrastructure: The systems and networks that must be compromised
Key Relationships
Social-Political: Connects adversary and victim (why am I being targeted?)
Technological: Connects capability and infrastructure (can they exploit what I have?)
Important: When analyzing threat groups (like APT-31), you typically understand three of the four components. The missing piece creates the “triangle” rather than complete diamond.
Organizational Breakdown for Threat Assessment
To properly assess threats, you must first understand your own organization through an adversarial lens. This requires a tiered approach:
Tier 1: System Owner
Definition: The primary organization for which you’re creating the threat profile.
Attributes to Consider:
Public vs. private company status
Geographic location and operating regions
Industry vertical(s)
Investors and ownership structure
Size and market capitalization
Media presence and public profile
Example: A publicly traded small-cap oil and gas company has different threat considerations than a private manufacturing facility.
Tier 2: Critical System/Subsystem
Definition: The collection of assets, networks, or specific systems requiring protection.
Considerations:
Large organizations may need multiple threat profiles based on:
Geography (Eastern vs. Western operations)
Business units (mergers & acquisitions)
Industry verticals (upstream vs. downstream oil & gas)
Facility types (power plants vs. pipelines)
Tier 3: Critical Function
Definition: The principal task your system performs.
Examples:
Pipeline: Deliver fuel
Hospital: Provide healthcare services
Utility: Generate and distribute electricity
Manufacturing: Produce goods
Tier 4: Components
Definition: The hardware and software enabling critical functions.
Examples for a Pipeline:
Pressure control systems (pumps, compressors)
Leak detection systems
Storage systems (control valves, tanks)
SCADA and control systems
Vendor support infrastructure
Tier 5: Controllers
Definition: Assets with the ability to manipulate the environment or exercise significant authority.
In OT Environments:
Remote Terminal Units (RTUs)
Distributed Control Systems (DCS)
SCADA systems
Programmable Logic Controllers (PLCs)
In IT Environments:
Domain controllers
SQL databases
Administrative workstations
Network backbone infrastructure
Key Point: Controllers represent where cyber commands become physical actions or where administrative access enables system-wide control.
Tier 6: Crown Jewels
Definition: The subset of components that, if compromised, cause catastrophic impact.
Characteristics:
Highest business impact if lost
Longest mean time to recovery (MTTR)
Most expensive to replace
Critical to minimum operating conditions
Pipeline Crown Jewels Example:
RTUs: Wireless control of remote compressor stations
Engineering Workstations: The Windows desktops used to control all above systems
Critical Insight: Engineering workstations often run outdated operating systems (Windows XP, Windows 7, Server 2008/2012) but provide the primary interface for controlling crown jewel systems.
Practical Application: Oil & Gas Pipeline Example
Organization Profile: “ACME Oil & Gas”
System Owner Attributes:
Publicly traded small-cap company
Regional operator with coastal infrastructure
U.S.-based with specific investor profile
Target for eco-terrorists due to environmental impact
Critical Function:
Deliver natural gas/fuel oil 24/7/365
Maintain specific delivery capacity (ramp up/down)
Meet EPA regulatory requirements
Key Components:
Pumping stations with vendor-specific equipment
Pressure control and monitoring
Leak detection systems (compliance-critical)
Storage tanks and control valves
Multiple vendor remote access solutions (7-8 different types)
Controllers:
RTUs for remote station control
DCS for process management
PLCs for discrete control functions
SCADA for overall monitoring
Crown Jewels:
RTUs controlling compressor stations (1100+ miles away)
Leak detection systems (EPA shutdown mandate)
SCADA control systems
Engineering workstations (single point of control)
Threat Capability Assessment
Understanding Adversary Sophistication
Not every organization faces the same threat landscape. MITRE ATT&CK and CISA provide frameworks for assessing threat capabilities:
Capability Levels:
Level
Characteristics
Examples
Advanced
Nation-state, zero-day exploits, custom tools
APT groups, intelligence services
Intermediate
Weaponized exploits, commercial tools, training
Criminal organizations, skilled hacktivists
Basic
Known exploits, open-source tools, limited resources
Script kiddies, unsophisticated criminals
Matching Threats to Your Profile
Questions to Ask:
Are you critical infrastructure?
Do you handle sensitive government data?
Are you a high-value financial target?
Do you have geopolitical significance?
Are you vulnerable to insider threats?
Example Threats by Organization Type:
Organization
Primary Threats
Small Retail
Opportunistic ransomware, credit card theft
Critical Infrastructure
Nation-states, advanced persistent threats
Healthcare
Ransomware, data theft, insider threats
Manufacturing
IP theft, industrial espionage, ransomware
Identifying Critical Assets: The “Bad Day” Exercise
Methodology
To identify crown jewels, ask stakeholders: “What does a bad day look like?”