{"id":1618,"date":"2022-06-08T18:51:39","date_gmt":"2022-06-08T10:51:39","guid":{"rendered":"https:\/\/choson.lifenet.com.tw\/?p=1618"},"modified":"2023-03-29T10:49:43","modified_gmt":"2023-03-29T02:49:43","slug":"%e4%ba%a4%e9%80%9a%e7%87%88%e5%8d%94%e8%ad%b0-traffic-light-protocol-tlp-%e5%b0%8d%e5%8f%af%e8%83%bd%e5%85%b1%e4%ba%ab%e7%9a%84%e5%a8%81%e8%84%85%e9%80%b2%e8%a1%8c%e4%ba%86%e5%88%86%e9%a1%9e","status":"publish","type":"post","link":"https:\/\/choson.lifenet.com.tw\/?p=1618","title":{"rendered":"\u4ea4\u901a\u71c8\u5354\u8b70 (Traffic Light Protocol :TLP) \u5c0d\u53ef\u80fd\u5171\u4eab\u7684\u5a01\u8105\u9032\u884c\u4e86\u5206\u985e\u548c\u63a7\u5236\u5171\u4eab\u60c5\u5831\u7684\u7bc4\u570d"},"content":{"rendered":"\n<p><img decoding=\"async\" src=\"https:\/\/ithelp.ithome.com.tw\/upload\/images\/20220608\/20132160ElPZ03VI40.jpg\" alt=\"https:\/\/ithelp.ithome.com.tw\/upload\/images\/20220608\/20132160ElPZ03VI40.jpg\"><br>-\u5716\u7247\u4f86\u6e90\uff1a<a href=\"https:\/\/socradar.io\/all-you-need-to-know-about-traffic-light-protocol-tlp\/\" target=\"_blank\" rel=\"noreferrer noopener\">socradar<\/a><br>\u7d05\u7da0\u71c8\u5354\u8b70 (TLP) \u662f\u4e00\u500b\u7528\u65bc\u5c0d\u654f\u611f\u8cc7\u8a0a\u9032\u884c\u5206\u985e\u7684\u7cfb\u7d71\uff0c\u8a72\u7cfb\u7d71\u7531\u82f1\u570b\u653f\u5e9c\u7684\u570b\u5bb6\u57fa\u790e\u8a2d\u65bd\u5b89\u5168\u5354\u8abf\u4e2d\u5fc3 (NISCC\uff1b\u73fe\u70ba\u570b\u5bb6\u57fa\u790e\u8a2d\u65bd\u4fdd\u8b77\u4e2d\u5fc3\uff0cCPNI) \u5275\u5efa\uff0c\u4ee5\u9f13\u52f5\u66f4\u591a\u5730\u5171\u4eab\u654f\u611f\u8cc7\u8a0a\u3002<br>\u57fa\u672c\u6982\u5ff5\u662f\u767c\u8d77\u8005\u8868\u660e\u4ed6\u5011\u5e0c\u671b\u4ed6\u5011\u7684\u8cc7\u8a0a\u5728\u76f4\u63a5\u63a5\u6536\u8005\u4e4b\u5916\u50b3\u64ad\u7684\u7bc4\u570d\u6709\u591a\u5ee3\u3002\u5b83\u65e8\u5728\u4ee5\u53d7\u63a7\u548c\u53d7\u4fe1\u4efb\u7684\u65b9\u5f0f\u6539\u5584\u500b\u4eba\u3001\u7d44\u7e54\u6216\u793e\u5340\u4e4b\u9593\u7684\u8cc7\u8a0a\u6d41\u3002\u8655\u7406\u5e36\u6709 TLP \u6a19\u8a18\u7684\u901a\u4fe1\u7684\u6bcf\u500b\u4eba\u90fd\u5fc5\u9808\u7406\u89e3\u4e26\u9075\u5b88\u5354\u8b70\u7684\u898f\u5247\uff0c\u9019\u4e00\u9ede\u5f88\u91cd\u8981\u3002\u53ea\u6709\u9019\u6a23\uff0c\u624d\u80fd\u5efa\u7acb\u4fe1\u4efb\u4e26\u5be6\u73fe\u8cc7\u8a0a\u5171\u4eab\u7684\u597d\u8655\u3002TLP \u57fa\u65bc\u767c\u8d77\u8005\u6a19\u7c64\u8cc7\u8a0a\u7684\u6982\u5ff5\uff0c\u4f7f\u7528\u56db\u7a2e\u984f\u8272\u4e2d\u7684\u4e00\u7a2e\u4f86\u6307\u793a\u63a5\u6536\u8005\u53ef\u4ee5\u9032\u884c\u54ea\u4e9b\u9032\u4e00\u6b65\u7684\u50b3\u64ad\uff08\u5982\u679c\u6709\u7684\u8a71\uff09\u3002\u5982\u679c\u9700\u8981\u66f4\u5ee3\u6cdb\u7684\u50b3\u64ad\uff0c\u63a5\u6536\u8005\u5fc5\u9808\u8aee\u8a62\u767c\u8d77\u8005\u3002<\/p>\n\n\n\n<p>\u76ee\u524d\u5b58\u5728\u8a31\u591a TLP \u898f\u7bc4\u3002<br>\u2013 \u4f86\u81ea ISO\/IEC\uff0c\u4f5c\u70ba\u8de8\u90e8\u9580\u548c\u7d44\u7e54\u9593\u901a\u4fe1\u7684\u8cc7\u8a0a\u5b89\u5168\u7ba1\u7406\u6a19\u6e96\u7684\u4e00\u90e8\u5206<br>\u2013 \u4f86\u81ea\u65e8\u5728\u63d0\u4f9b\u516c\u958b\u53ef\u7528\u7684\u7c21\u55ae\u5b9a\u7fa9\u7684 US-CERT<br>\u2013 \u4f86\u81ea\u4e8b\u4ef6\u97ff\u61c9\u548c\u5b89\u5168\u5718\u968a\u8ad6\u58c7(FIRST)\uff0c\u5b83\u65bc 2016 \u5e74 8 \u6708 31 \u65e5\u767c\u5e03\u4e86\u5176\u5408\u4f75 TLP \u6587\u6a94\u7684 1.0 \u7248\u3002\u5b83\u4f86\u81ea\u4e00\u500b\u7279\u6b8a\u8208\u8da3\u5c0f\u7d44\uff0c\u65e8\u5728\u78ba\u4fdd\u5c0d TLP \u7684\u89e3\u91cb\u662f\u4e00\u81f4\u7684\uff0c\u4e26\u4e14\u5728\u7528\u6236\u793e\u5340\u4e2d\u5b58\u5728\u660e\u78ba\u7684\u671f\u671b\u3002<br>\u8cc7\u6599\u4f86\u6e90\uff1a<a href=\"https:\/\/en.wikipedia.org\/wiki\/Traffic_Light_Protocol\" target=\"_blank\" rel=\"noreferrer noopener\">\u7dad\u57fa\u767e\u79d1<\/a><\/p>\n\n\n\n<p>\u53c3\u8003<br>.&nbsp;<a href=\"https:\/\/www.cisa.gov\/ais\" target=\"_blank\" rel=\"noreferrer noopener\">\u7db2\u8def\u5b89\u5168\u548c\u57fa\u790e\u8a2d\u65bd\u5b89\u5168\u5c40 (CISA) \u7684\u81ea\u52d5\u6307\u6a19\u5171\u4eab (AIS)<\/a><br>.&nbsp;<a href=\"https:\/\/securityintelligence.com\/navigating-a-sea-of-threat-intelligence-specifications\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u99d5\u99ad\u5a01\u8105\u60c5\u5831\u898f\u7bc4\u7684\u6d77\u6d0b<\/a><br>.&nbsp;<a href=\"https:\/\/www.threathunting.net\/files\/A%20Framework%20for%20Cyber%20Threat%20Hunting%20Part%201_%20The%20Pyramid%20of%20Pain%20_%20Sqrrl.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">\u7db2\u8def\u5a01\u8105\u641c\u5c0b\u6846\u67b6\u7b2c 1 \u90e8\u5206\uff1a\u75db\u82e6\u91d1\u5b57\u5854<\/a><br>.&nbsp;<a href=\"https:\/\/detect-respond.blogspot.com\/2013\/03\/the-pyramid-of-pain.html\" target=\"_blank\" rel=\"noreferrer noopener\">\u75db\u82e6\u91d1\u5b57\u5854 (DavidJBianco)<\/a><br>.&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Indicator_of_compromise\" target=\"_blank\" rel=\"noreferrer noopener\">\u59a5\u5354\u6307\u6a19\uff08\u7dad\u57fa\u767e\u79d1\uff09<\/a><br>.&nbsp;<a href=\"https:\/\/zvelo.com\/pyramid-of-pain\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u5c07 zveloCTI \u5a01\u8105\u60c5\u5831\u6578\u64da\u6620\u5c04\u5230\u59a5\u5354\u6307\u6a19 (IOC) \u7684\u75db\u82e6\u91d1\u5b57\u5854<\/a><br>.&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Traffic_Light_Protocol\" target=\"_blank\" rel=\"noreferrer noopener\">\u7d05\u7da0\u71c8\u5354\u8b70<\/a><br>.&nbsp;<a href=\"https:\/\/socradar.io\/all-you-need-to-know-about-traffic-light-protocol-tlp\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u60a8\u9700\u8981\u4e86\u89e3\u7684\u6709\u95dc\u5a01\u8105\u60c5\u5831\u4e2d\u4ea4\u901a\u71c8\u5354\u8b70\u4f7f\u7528\u7684\u77e5\u8b58<\/a><\/p>\n\n\n\n<p>\u8cc7\u6599\u4f86\u6e90\uff1a\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/wentzwu.com\/2021\/10\/27\/cissp-practice-questions-20211027\/\" target=\"_blank\">Wentz Wu QOTD-20211027<\/a><\/p>\n\n\n\n<p>PS:\u6b64\u6587\u7ae0\u7d93\u904e\u4f5c\u8005\u540c\u610f\u520a\u767b \u4e26\u4e14\u6388\u6b0a\u53ef\u4ee5\u7ffb\u8b6f\u6210\u4e2d\u6587<\/p>\n","protected":false},"excerpt":{"rendered":"<p>-\u5716\u7247\u4f86\u6e90\uff1asocradar\u7d05\u7da0\u71c8\u5354\u8b70 (TLP) \u662f\u4e00\u500b\u7528\u65bc\u5c0d\u654f\u611f\u8cc7\u8a0a\u9032\u884c\u5206\u985e\u7684\u7cfb\u7d71\uff0c\u8a72\u7cfb\u7d71\u7531\u82f1\u570b\u653f\u5e9c\u7684\u570b\u5bb6 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":true,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-1618","post","type-post","status-publish","format-standard","hentry","category-cisspcertified-information-systems-security-professional"],"_links":{"self":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/1618","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1618"}],"version-history":[{"count":2,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/1618\/revisions"}],"predecessor-version":[{"id":2736,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/1618\/revisions\/2736"}],"wp:attachment":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1618"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1618"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1618"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}