- Published on
Cyber Killchain
- Authors
- Name
- Ian Atha
- @IanAtha
Cyber Killchain
Every attack on information infrastructure takes the following form:
- Reconnaissance
- Weaponization
- Delivery
- Exploitation
- Persistence
- Actions on Objectives
Lockheed Martin popularized this list as a Cyber Killchain.
The key is that it's a chain, therefore weakening any part of it, weakens the chain. The "defense in depth" directive of any infosec approach is informed by this fact.