Beyond the Kill Chain – Active Defense

I have been working my way through a Cybrary course titled ” Incident Response and Advanced Forensics.”  In it I came across the following slide, and what interested me was how it juxtaposed the Lockheed-Martin Cyber Kill Chain against a lower row of defensive tactics.  The last option, hidden beneath the instructor’s image, is “Destroy.”

Where did this intriguing six step process come from?  Upon further research, I found it included in an interesting document on the NIST website, called Operational Levels of Cyber Intellegence.  At 16 pages (only 12 or so to read), I found it an interesting expansion on some of the ideas we discussed in Friday’s post.

Here is an expansion of the Cyber Kill Chain from the attackers perspective.  This gives more detail about the process that the attacker will be using to acquire and maintain access to your network.

Here is the defenders process arrayed against the kill chain.

And here it is displayed against the expanded attack matrix.

If any of this is interesting to  you, please click through to the source material.  If you are looking to take your cybersecurity program from purely defensive to a more active and agressive defense , this will give you a good place to start.

More information:


About the Author:

Cybersecurity guru to business owners in the St Paul, Minneapolis, and western Wisconsin area. Computer security and hacking have been a passion of mine since I entered the computer and networking business in 2000. In 2013 I completed a course of study and certification exam to become a Certified Ethical Hacker (CEH). In 2016 I was certified as a Certified Information Systems Security Professional (CISSP). As Cybersecurity Analyst at The WyzCo Group, I help our clients experience high levels of computer security, network security, and web site security. In addition to consulting on security products and services, we also conduct security audits, vulnerability assessments and full penetration tests. We also provide Cybersecurity Awareness Training for clients and their employees. We also work with companies and organizations that need to certify compliance with regulations such as PCI-DSS (credit card processing), HIPAA/HITECH (medical records), and GLBA. The views expressed on this Web site are mine alone and do not necessarily represent the views of my employer.

Add a Comment