Find, Fix, Track, Target, Engage…in air, space, and cyberspace!
Compressing the kill chain – cutting the time needed to strike time critical or time sensitive targets – has been an aim of the USAF for many years. Kill Chain Analysis seems relevant in all the warfighting domains of the USAF.
Defensible Security Posture – Part 2
How can you leverage the Defensible Actions Matrix? A defensible actions matrix defines processes and procedures that can impact an attacker’s capability at various stages of the cyber kill chain.
Cyber Kill Chain
In Defensible Security Posture – Part 1 we introduced the concept of the Cyber Kill Chain. As a recap, a “kill chain” describes the progression an attacker follows when planning and executing an attack against a target. Understanding the signature of an APT helps align defensive capabilities, i.e., to identify security controls and actions that can be implemented or improved to detect, deny, and contain an attack scenario.
The APT Signature and Cyber Kill Chain
A complex incident may involve multiple kill chains with different objectives that map to various phases of the attack. For example, reconnaissance is performed to assess target feasibility to develop an attack plan. Attackers may…
View original post 2,018 more words