Kill chains: Part 2→Strategic and tactical use cases

Kill chains: Part 2→Strategic and tactical use cases

Let’s redefine


In our new blog series, we want to contextualize the term “kill chain” as much as possible. Make sure to read the first entry in this series, Kill chains: Part 1→Strategic and operational value, for a general overview of kill chains and the specific frameworks we’ve discussed. We already know the term was used by armed forces to provide transparency on how an enemy attacks a target, but beyond understanding how enemies think, how can security organizations gain the upper-hand to put down threats and risks before they cause harm?


Let’s now take a look at how you can leverage the different kill chains to overcome vulnerabilities and win the day against attackers.


Lockheed Martin Cyber Kill Chain


The heading above may look familiar, but in the spirit of connecting themes in this series let’s discuss key use cases of this particular kill chain.


Strategic usage
Organizations can expect to use this kill-chain methodology to examine the effectiveness of controls at the big-picture level.
It's fairly easy to grasp, and helps provide a contextual window into standing up processes such as a security-awareness training program.
Tactical usage
At this actionable level, it’s important to remember to implement anti-virus measures to combat the exploitation phase. It is, after all, a very linear process where attackers might combine multiple steps into a single offensive against cloud infrastructure.

MITRE ATT&CK Kill Chain


Remember, MITRE started this project to document tactics, techniques, and procedures; it helps to detect adversary behavi ..

Support the originator by clicking the read the rest link below.