From CISO Marketplace — the hub for security professionals Visit

Attack Chain Mapping

Threat Intelligence

Definition

The process of documenting and analyzing the steps taken during a cyber attack.

Technical Details

Attack Chain Mapping involves the systematic representation of the stages and techniques employed by attackers during a cyber incident. It often utilizes frameworks such as the Cyber Kill Chain, MITRE ATT&CK, or the Diamond Model of Intrusion Analysis. Each stage of the attack is broken down to identify tactics, techniques, and procedures (TTPs) that adversaries use, which helps in understanding the attack's lifecycle from reconnaissance to lateral movement, data exfiltration, and impact.

Practical Usage

In practical terms, Attack Chain Mapping is used by cybersecurity teams to enhance incident response capabilities, improve threat detection, and develop proactive defense strategies. It serves as a foundation for threat modeling, vulnerability assessments, and creating tailored security measures. Organizations incorporate it into their cybersecurity frameworks to ensure comprehensive situational awareness and strengthen their overall security posture.

Examples

Related Terms

Cyber Kill Chain MITRE ATT&CK Threat Modeling Incident Response Vulnerability Assessment
← Back to Glossary