Primary Source Risk Repository
In the context of cybersecurity and modern risk management, a Primary Source Risk Repository is a centralized, immutable database that aggregates raw, unaltered risk intelligence directly from its origin points—such as digital assets, external threat feeds, and compliance audits.
Unlike a traditional risk register, which often contains subjective summaries or secondary interpretations of data (e.g., an analyst's report about a vulnerability), a Primary Source Risk Repository stores the original evidence itself. This ensures that security teams, auditors, and automated systems are always making decisions based on the objective "ground truth" rather than potentially outdated or biased summaries.
Core Philosophy: The "Source of Truth"
The repository operates on the principle that risk data should be treated as evidence. By maintaining the primary source material, organizations avoid the "Telephone Game" effect, in which critical details are lost as data passes from a scanner to a report to a spreadsheet, and finally to a decision-maker.
Primary Source: The original artifact (e.g., the raw JSON output from a port scan, the actual HTML code of a dark web phishing page, or a court filing document).
Secondary Source: An interpretation of that artifact (e.g., a PDF report summarizing "High Risk vulnerabilities found").
Key Components of the Repository
A robust Primary Source Risk Repository aggregates diverse types of raw data to create a holistic view of the attack surface.
Technical Evidence:
Raw Telemetry: Direct outputs from Nmap scans, Shodan queries, or cloud configuration files.
Digital Artifacts: Captured SSL certificates, DNS records, and server headers.
Threat Intelligence Artifacts:
Dark Web Content: Sanitized snapshots of actual ransomware blog posts or marketplace listings (rather than just a text alert saying "data leak detected").
Malware Indicators: Original file hashes and command-and-control (C2) IP addresses.
Business & Operational Records:
Legal Filings: Actual court docket entries regarding litigation or regulatory fines.
Financial Data: Raw SEC filings or bankruptcy court records that indicate vendor instability.
Operational Benefits
Implementing a Primary Source Risk Repository shifts an organization from reactive "Alert Management" to proactive "Evidence Management."
1. Elimination of False Positives
Because the repository holds the raw data, analysts can validate alerts immediately. If a vulnerability scanner flags a "Potential SQL Injection," the analyst can review the primary HTTP response stored in the repository to determine whether the server returned an error, rather than relying on the scanner's confidence score.
2. Retroactive Threat Hunting
Security logic changes over time. A Primary Source Risk Repository allows for "Time Travel" analysis. If a new vulnerability is discovered today (e.g., in a specific library), the team can query the repository's historical raw data to determine whether that library was present on their systems six months ago, even if no alert was generated at the time.
3. Audit Defensibility
In the event of a regulatory audit or lawsuit, the repository provides a defensible chain of custody. Instead of showing an auditor a spreadsheet that says "We checked for compliance," you show the timestamped, raw scan logs that prove the specific controls were in place at that exact moment.
Frequently Asked Questions
How does this differ from a SIEM? A SIEM (Security Information and Event Management) focuses on events and logs for real-time detection (e.g., "User A failed to login"). A Primary Source Risk Repository focuses on state and existence (e.g., "Server B has Port 80 open and is running Apache 2.4"). While they overlap, the repository is often the "Inventory of Truth" that feeds context into the SIEM.
Does it replace a GRC platform? No, it powers it. A Governance, Risk, and Compliance (GRC) platform manages workflow and policy. The Primary Source Risk Repository provides the evidence that the GRC platform needs to mark a control as "Passed" or "Failed."
Why is "Unaltered" data important? If data is normalized or summarized before being stored, detail is lost. An "unaltered" repository preserves the original format, ensuring that no nuance is stripped away by a parser. This is critical for forensic analysis after a breach.
ThreatNG and the Primary Source Risk Repository
ThreatNG functions as the foundational engine for a Primary Source Risk Repository by automating the collection, preservation, and analysis of raw external data. Instead of relying on secondary summaries or subjective vendor questionnaires, ThreatNG harvests the original, unaltered digital artifacts—from raw port scan banners to actual dark web screenshots—creating a definitive "Source of Truth" for the organization’s external attack surface.
By centralizing this raw evidence, ThreatNG ensures that risk decisions are based on the objective reality of the digital environment.
External Discovery as the Data Ingestion Engine
A Primary Source Risk Repository is only as good as the data it ingests. ThreatNG’s External Discovery capabilities ensure the repository is populated with a complete, unfiltered inventory of the external ecosystem.
Recursive Asset Collection: ThreatNG does not simply list known assets; it recursively crawls the internet to uncover the organization's raw "digital DNA". It collects primary-source data, such as original WHOIS records, DNS zone files, and cloud storage bucket configurations. This ensures the repository contains the actual technical identifiers for every domain, subdomain, and third-party dependency, capturing "Shadow IT" that would otherwise be missed in manual inventories.
Supply Chain Enumeration: The system identifies the raw connections between the organization and its partners. It logs the specific script sources and third-party hosting providers, populating the repository with the primary evidence of "Fourth-Party" relationships.
External Assessment for Multidimensional Evidence
ThreatNG’s Assessment Engine transforms the repository from a simple list of assets into a database of validated evidence. It collects primary-source data across multiple dimensions, ensuring the repository contains evidence of risk, not just theoretical alerts.
Technical Evidence Collection: ThreatNG captures the raw technical state of assets.
Example: When assessing a web server, ThreatNG records the specific SSL certificate details (issuer, expiration date, serial number) and the raw HTTP header responses. This primary data allows engineers to verify exactly why a vulnerability was flagged (e.g., seeing the "Apache 2.2" version banner in the raw header).
Business and Operational Records: Uniquely, ThreatNG populates the repository with non-technical primary sources.
Example: It retrieves data from Legal Resources and Financial Resources. Instead of just a "High Risk" flag, the repository stores a reference to the specific court docket for a lawsuit or the vendor's actual bankruptcy filing status. This allows legal and finance teams to audit the primary source material directly within the risk platform.
Reputation and Sentiment Artifacts: The assessment engine captures raw sentiment data.
Example: It logs specific negative mentions from news outlets or social platforms. This provides the primary source text needed to analyze the context of a reputational dip, rather than relying on an abstract numerical score.
Investigation Modules for Forensic Validation
ThreatNG’s investigation modules allow analysts to interact safely with primary source data, validating risks without leaving the secure environment.
Sanitized Dark Web Evidence: A critical component of a Primary Source Risk Repository is evidence of compromise.
Detailed Example: When a data leak is suspected, ThreatNG’s Sanitized Dark Web module retrieves a navigable copy of the actual dark web marketplace listing or ransomware blog post. It sanitizes the content (removing malware) but preserves the text and visual layout. This allows the repository to hold a timestamped image of the threat as it appeared to the attacker, providing irrefutable proof of the breach for forensic and legal review.
Archived Web Page Analysis: ThreatNG allows users to access the historical primary source.
Detailed Example: If a website is defaced and then quickly patched, the evidence is usually lost. ThreatNG allows investigators to retrieve the Archived Web Page, showing exactly how the site looked during the incident. This HTML snapshot is stored as a primary record, allowing the team to prove exactly what content was exposed to the public at that specific point in time.
Intelligence Repositories as the Central Archive
ThreatNG’s internal Intelligence Repositories serve as the structured storage for this primary data, acting as the "Library of Record" for the external attack surface.
Vulnerability and Threat Libraries: The platform maintains deep repositories of known vulnerabilities (CVEs) and threat actor profiles. By correlating discovered assets with these libraries, ThreatNG links the organization's primary asset data to the cybersecurity community's primary intelligence data.
Historical Data Retention: The repository allows for longitudinal analysis. By storing primary source data over time, organizations can look back to the exact state of a vendor’s infrastructure six months ago, enabling retroactive investigations.
Continuous Monitoring for Dynamic Data Integrity
A Primary Source Risk Repository must be living, not static. ThreatNG’s Continuous Monitoring ensures the data remains current.
Real-Time State Updates: As the external environment changes, ThreatNG updates the repository. If a vendor updates their software or a domain changes ownership, the primary record is refreshed to reflect the new state.
Drift Documentation: The monitoring engine logs the specific changes between the old primary record and the new one (e.g., "Port 80 closed, Port 443 opened"). This creates a verifiable audit trail of infrastructure changes.
Reporting as Evidence Export
ThreatNG’s Reporting module allows the organization to export the primary source data for external consumption.
Audit-Ready Artifacts: The system generates reports that present the raw evidence needed for compliance. Instead of a summary saying "We are compliant," the report provides the mapped primary data—specific SSL scores, patch levels, and clean dark web searches—that auditors require to sign off on controls.
Complementary Solutions
ThreatNG serves as the "Evidence Provider" for the broader security ecosystem, feeding high-fidelity, primary-source data into other platforms.
Security Information and Event Management (SIEM) ThreatNG feeds external context to the SIEM.
Cooperation: SIEMs collect internal logs. ThreatNG complements this by feeding the SIEM with primary source data on external threats, such as the raw IPs of known Command and Control servers or the specific domains associated with a phishing campaign. This allows the SIEM to correlate internal traffic logs against a verified list of external bad actors.
Governance, Risk, and Compliance (GRC) ThreatNG provides the proof for GRC controls.
Cooperation: GRC platforms track policy compliance. ThreatNG provides the primary evidence that validates these policies. If a GRC control requires "Vendor Due Diligence," ThreatNG provides the vendor's raw financial health data and security assessment logs. This transforms the GRC platform from a checklist into an evidence-backed repository of compliance.
Third-Party Risk Management (TPRM) ThreatNG validates vendor questionnaires.
Cooperation: TPRM tools manage vendor assessment workflows. ThreatNG injects primary source data into this workflow. When a vendor claims to be secure, the TPRM platform can reference ThreatNG’s data (e.g., the actual scan results showing open ports) to validate or dispute the vendor’s claim instantly.
Frequently Asked Questions
Why is "Sanitized" dark web data considered a primary source? It is considered a primary source because it captures the content of the threat (the text, the listing details, the file names) exactly as it appeared on the dark web. The "sanitization" only removes the technical risk (malware scripts) while preserving the evidentiary value of the information.
Does ThreatNG store the actual files found in a breach? No. ThreatNG identifies and provides evidence of the breach (e.g., file listings, screenshots, sample data). Storing the full stolen data dump would create liability and privacy issues. It points to the existence of the data so the organization can act.
Can ThreatNG’s repository help with cyber insurance claims? Yes. Insurance claims often require proof that specific security measures were in place at the time of an incident. ThreatNG’s historical reports and archived assessments serve as primary source evidence of due diligence, helping to substantiate the claim.

