MISP Management Models for Effective Threat Intelligence in Cybersecurity
DOI:
https://doi.org/10.34190/eccws.24.1.3536Keywords:
MISP Integration, Cybersecurity Governance Models, Centralized and Decentralized Management, Hybrid and Federated Structures, Cyber ResilienceAbstract
Studies conducted in the context of the DYNAMO Horizon Europe project reveal that a significant proportion of regional cyber threat intelligence (CTI) data is still shared through manual methods such as email and chat. While these systems are generally viewed positively, they are also understood to be prone to delays and inaccuracies. The interest in utilizing the Malware Information Sharing Platform (MISP) is rising, yet its implementation is still nascent. Effective integration of MISP into cybersecurity operations hinges on selecting an appropriate governance model. This paper evaluates four models—Centralized, Decentralized, Hybrid, and Federated—to understand their advantages, limitations, and suitability for diverse organizational needs. As cyber threats grow in complexity, organizations increasingly rely on collaborative tools like MISP, requiring robust management frameworks to ensure efficient threat intelligence sharing. This study involves a systematic review of literature and desk research of materials produced during the DYNAMO project to analyse different governance models in terms of their alignment with MISP's objectives, operational needs, and organizational structures. The study’s main conclusion is that no single governance model fits all scenarios. Centralized models ensure compliance and consistency, making them ideal for small or regulated environments. Decentralized models offer flexibility for organizations with varied local demands but risk fragmentation. Hybrid and Federated models balance centralized control with local autonomy, providing scalability and resilience for large or complex organizations. Among these, the hybrid model stands out for its ability to dynamically address cybersecurity threats while maintaining cohesive governance. However, successful MISP integration also depends on user engagement, clear protocols, and adaptability to evolving needs. This study provides actionable insights to optimize MISP governance, enhancing collaboration, compliance, and cybersecurity resilience. The study also highlights the importance of ongoing training, clear procedures, and active user participation to maximize MISP’s benefits. These insights help organizations build resilience and stay adaptable to evolving cybersecurity challenges.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 European Conference on Cyber Warfare and Security

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.