neil-unomaha / CIF_CYBR_8950

MIT License
1 stars 0 forks source link

Questions for Brian #13

Closed neil-unomaha closed 4 years ago

neil-unomaha commented 4 years ago

After reading the documentation for CIF version 4 and comparing it to CIF version 3, as well as playing around with CIF 4 in a test environment, we have a couple of questions related to usage and available functionality.

If possible, it would probably be most helpful if we sat down with you in person with our test environment handy. We imagine you could provide us with some helpful tips.

  1. How do threats get ingested into CIF?

    • What is the command/process?
    • No documentation for “Creating a feed parsing configuration file” section in CIF 4 but there is for CIF 3.
    • Does this mean the functionality does not exist?
  2. For testing purposes, how can we ingest some threats into our test environment?

  3. What is the existing CIF API for version 4? How do you use it?

    • Little documentation in CIF 4
    • More robust documentation in CIF 3
  4. Outputting threat feeds: To confirm: this is done with the CIF CLI client, and you specify the desired options to get the desired output via the cif command. Is this accurate? CIF 4 docs