METEORSTORM & Space Collective Defense
4 Hours | 4 Knowledge Domains | 4 CPE Credits
NIST NICE PD-WRL-006: Threat Analysis
Delivered by ProofLabs | In partnership with ethicallyHackingspace (eHs)®
Today you become intelligence architects. Each mission builds on the last—from understanding doctrine, to building platforms, to connecting the constellation, to launching live systems. By the end, you will have deployed and integrated enterprise threat intelligence platforms ready for Space Collective Defense.
Space Collective Defense is the collaborative strategy where space operators, critical infrastructure owners, government agencies, and commercial partners share threat intelligence and coordinate defensive actions in real time.
SCORP² Threat Intelligence Architect | NIST NICE PD-WRL-006
The Threat Intelligence Architect designs, deploys, and operates the intelligence infrastructure that enables Space Collective Defense.
NIST NICE Work Role PD-WRL-006: Threat Analysis
This course takes you from doctrine to deployment in four hours.
Before you can build intelligence systems, you must understand the doctrine that drives them. This mission traces threat intelligence from its military origins through today's commercial landscape to the autonomous future—and equips you with the intelligence planning methodology that will guide every decision you make as an architect.
The evolution of threat intelligence spans decades of paradigm shifts, from signature-based detection to adversary-centric analysis.
"CJCSM 3314.01A and the Adaptive Planning and Execution (APEX) system represent the doctrinal foundation we adapt for commercial application."
The threat intelligence landscape has matured into a rich ecosystem of frameworks, standards, platforms, and sharing communities.
Standards: STIX 2.1, TAXII 2.1, OpenIOC, YARA, Sigma | Platforms: OpenCTI, MISP, Recorded Future, Mandiant
The threat intelligence landscape is evolving toward autonomous, machine-speed collective defense at sector scale.
"The TIA you become today builds the infrastructure that enables this future."
CJCSM 3314.01A provides the doctrinal framework for intelligence planning that we adapt for commercial space cybersecurity operations.
"Military doctrine provides the rigor and structure. Commercial application provides the agility and scale. The TIA bridges both."
Intelligence exists to support decisions. Every PIR must be anchored to a specific decision context at the executive, security, mission, or regulatory level.
"A PIR without a decision context is just a question. Tied to a decision, it becomes the engine of your intelligence program."
Strategic PIR: "Are nation-state actors actively targeting commercial LEO communication constellations?"
Using the provided scenario, complete the four intelligence planning templates.
Timer: 5 minutes | Guided walkthrough with instructor
Deliverable: Completed set of four intelligence planning documents ready for platform integration in Mission 2.
Q1: Describe the evolution from signature-based defense to threat-informed defense. What was the key paradigm shift, and how does CJCSM 3314.01A doctrine inform modern commercial intelligence programs?
Q2: Walk through the PIR decomposition chain (PIR → EEI → Indicators → SIR). Why is each level necessary, and what happens if you skip a level?
Capstone Activity: Present your PIR decomposition to your team. Defend your indicator selection and source assignments.
Proficiency Levels: Emerging | Developing | Proficient | Expert
You now have the doctrinal foundation and intelligence planning methodology. But methodology without infrastructure is just paperwork.
Next mission: FORGE — we build the platforms that bring your intelligence architecture to life.
Take a break. When you return, we build the engine.
Your intelligence planning is complete. Now build the platforms that will power it. This mission takes you deep into the architecture, data models, and connector ecosystems of OpenCTI and MISP—the twin engines of your threat intelligence infrastructure.
Every threat intelligence platform must fulfill five core functions to deliver operational value.
Architecture Patterns: Centralized | Distributed | Federated | Hybrid
OpenCTI is designed as a knowledge management system for cyber threat intelligence, with STIX 2.1 as its native data model.
MISP is optimized for sharing threat intelligence between organizations, with a rich community ecosystem and flexible distribution model.
github.com/MISP/misp-taxonomies/meteorstorm natively availableThe power of the TIA architecture comes from seamless integration between OpenCTI, MISP, and the broader security ecosystem.
STIX and TAXII are the foundational standards that enable automated, machine-to-machine threat intelligence sharing.
"STIX is what you say. TAXII is how you say it. Together they enable machine-to-machine collective defense."
The STARCOM-LEO reference architecture demonstrates a complete, operational TIP deployment for a fictional LEO constellation operator.
Working in teams, design a TIP architecture for a provided space operator scenario.
Timer: 10 minutes | Discussion-based, instructor-facilitated
Deliverable: Architecture diagram on whiteboard or digital canvas ready for peer review.
Q1: Compare the data models of OpenCTI and MISP. How does OpenCTI's STIX 2.1 native model differ from MISP's event-attribute model? What are the implications for data fidelity during synchronization?
Q2: You need to share indicators with three different partner organizations at three different TLP levels. How do you configure your architecture to enforce this automatically?
Capstone Activity: Present your TIP architecture design to the class. Defend your platform selection, architecture pattern, and integration decisions.
Proficiency Levels: Emerging | Developing | Proficient | Expert
Your platforms are designed. But a platform without connections is just a database.
Next mission: NEXUS — we connect your intelligence architecture to the Space Collective Defense ecosystem.
Take a break. When you return, we connect the constellation.
Your platforms are built. Now connect them to the world. This mission integrates your intelligence architecture into the Space Collective Defense ecosystem—ISACs, government programs, international partners, and automated sharing protocols.
The Space Collective Defense ecosystem spans three tiers of sharing partners, each providing unique intelligence value.
"Every connection multiplies your visibility. A single operator sees their own threats. A connected community sees the entire threat landscape."
Human-only workflows cannot scale to the volume and velocity of modern threats. Automated sharing is not optional — it is the only viable path to collective defense.
Trust is the foundation of collective defense. Governance documents encode that trust into enforceable agreements.
A policy without a platform is aspirational. A platform without a policy is dangerous. The TIA builds both.
"A policy without a platform is aspirational. A platform without a policy is dangerous. The TIA builds both."
Using the four provided templates, customize for your organization's context.
Timer: 20 minutes | Guided walkthrough with instructor
Deliverable: Four customized governance documents ready for organizational review.
Q1: Explain the difference between automated feed consumption and automated feed publication. What safeguards must be in place for each?
Q2: A partner organization wants to join your sharing community but operates under GDPR restrictions that limit data transfer. How do you structure the sharing agreement to enable participation while maintaining compliance?
Capstone Activity: Present your customized sharing agreement to the class. Explain your TLP enforcement strategy and how it balances openness with protection.
Proficiency Levels: Emerging | Developing | Proficient | Expert
Your architecture is designed, your governance is in place, and your sharing connections are mapped. There is only one thing left: launch.
Next mission: IGNITION — deploy your platforms and prove the architecture works.
Take a break. When you return, we launch.
This is launch day. Everything you have learned—doctrine, architecture, sharing governance—comes together now. You will deploy functional OpenCTI and MISP instances, configure bidirectional synchronization, subscribe to TAXII feeds, and validate end-to-end intelligence sharing.
Before beginning the lab, verify your environment is ready.
Deploy OpenCTI with all required services and configure the MITRE ATT&CK connector.
docker compose up -dValidation: Can you access the OpenCTI dashboard? Is the ATT&CK data populating? Is the TAXII feed connected?
Deploy MISP with default feeds, METEORSTORM taxonomy, and a configured sharing group.
docker compose up -dValidation: Can you access the MISP dashboard? Are feeds pulling? Is METEORSTORM active? Is your event created?
Configure bidirectional synchronization and validate end-to-end intelligence sharing.
All three validation checkpoints must pass for course completion.
docker compose logs [service_name]. Verify environment variables. Ensure sufficient RAM allocation.Instructor support available for deployment issues. Raise hand for assistance.
Proficiency Levels: Emerging | Developing | Proficient | Expert
All four missions are complete. You have mastered doctrine, designed architecture, established governance, and deployed operational platforms. You are a Threat Intelligence Architect.
4 Domains | 4 Missions | Platforms Deployed | Intelligence Flowing
4 Domains | 4 Missions | 2 Platforms Deployed | Intelligence Operational
CPE Credits: This course qualifies for 4 CPE credits aligned to NIST NICE PD-WRL-006
Certificate: SCORP² Threat Intelligence Architect course completion certificate issued upon instructor validation.
You are now part of a growing community of intelligence architects building the shared defense of the space domain.
Certificate: SCORP² Threat Intelligence Architect course completion certificate issued upon instructor validation.
Advancing Space Collective Defense Through Community-Driven Intelligence Sharing
ethicallyHackingspace (eHs)® | ProofLabs | TLP-GREEN
© 2026 ethicallyHackingspace (eHs)® All Rights Reserved