Skip to main content

Cyber Killchain

· One min read

Every attack on information infrastructure takes the following form:

  • Reconnaissance
  • Weaponization
  • Delivery
  • Exploitation
  • Persistence
  • Actions on Objectives

Lockheed Martin popularized this list as a Cyber Killchain.

The key is that it's a chain, therefore weakening any part of it, weakens the chain. The "defense in depth" directive of any infosec approach is informed by this fact.