I have been working my way through a Cybrary course titled ” Incident Response and Advanced Forensics.” In it I came across the following slide, and what interested me was how it juxtaposed the Lockheed-Martin Cyber Kill Chain against a lower row of defensive tactics. The last option, hidden beneath the instructor’s image, is “Destroy.”
Where did this intriguing six step process come from? Upon further research, I found it included in an interesting document on the NIST website, called Operational Levels of Cyber Intellegence. At 16 pages (only 12 or so to read), I found it an interesting expansion on some of the ideas we discussed in Friday’s post.
Here is an expansion of the Cyber Kill Chain from the attackers perspective. This gives more detail about the process that the attacker will be using to acquire and maintain access to your network.
Here is the defenders process arrayed against the kill chain.
And here it is displayed against the expanded attack matrix.
If any of this is interesting to you, please click through to the source material. If you are looking to take your cybersecurity program from purely defensive to a more active and agressive defense , this will give you a good place to start.
- WyzGuys on the Cyber Kill Chain
- WyzGuys on Deterrence (from Friday)
- NIST Operational Levels of Cyber Intellegence
- Lockheed-Martin Cyber Kill Chain