Kill Chain — Structured Model of the Cyber Attack Lifecycle

The Kill Chain is a structured model that describes the sequential stages of a cyber attack, from reconnaissance to impact. This SECMONS glossary entry explains the Lockheed Martin Cyber Kill Chain, its relevance in modern defense strategy, and how it complements MITRE ATT&CK.

What Is the Kill Chain? 🧠

The Kill Chain is a structured model that outlines the sequential stages of a cyber attack, from initial reconnaissance to final impact.

Originally developed as the Lockheed Martin Cyber Kill Chain, the model provides a high-level framework for understanding how intrusions unfold and where defensive controls can interrupt adversary activity.

It transforms isolated events into a coherent operational sequence.


The Seven Phases of the Cyber Kill Chain 🎯

The traditional Cyber Kill Chain consists of seven stages:

Phase Description
Reconnaissance Attacker gathers information about target
Weaponization Creation of malicious payload
Delivery Transmission of payload to victim
Exploitation Triggering vulnerability or executing payload
Installation Establishing persistence
Command & Control Remote communication with attacker
Actions on Objectives Data theft, disruption, or impact

Each phase represents an opportunity for detection or disruption.


Mapping Kill Chain to Modern Concepts 🔄

The Kill Chain overlaps with concepts documented across SECMONS:

The model provides structure, while frameworks like MITRE ATT&CK provide granular technique mapping.


Kill Chain vs MITRE ATT&CK 🔬

Model Focus
Kill Chain Sequential attack stages
MITRE ATT&CK Detailed adversary techniques and tactics
Campaign Analysis Operational context over time
Threat Intelligence Interpretation and correlation

The Kill Chain emphasizes progression.
MITRE ATT&CK emphasizes behavioral detail.

Both are complementary.


Why the Kill Chain Matters Defensively 🛡️

The model reinforces a critical principle:

Disrupting any single stage can break the chain.

Examples:

  • Strong email filtering blocks delivery.
  • Patch management prevents exploitation.
  • Network segmentation limits lateral movement.
  • Monitoring reduces dwell time during command and control.
  • Zero Trust architecture reduces blast radius.

The earlier a phase is disrupted, the lower the operational impact.


Kill Chain in Modern Threat Campaigns 🔎

Although modern attacks may blur phases or execute them rapidly, structured campaigns described under /glossary/campaign/ still follow recognizable progression patterns.

Even advanced persistent threats adhere to lifecycle stages, though they may:

  • Loop back to reconnaissance
  • Maintain long-term persistence
  • Operate in parallel across victims

Understanding this sequence improves incident response prioritization.


Strategic Value for Security Leaders 📌

The Kill Chain enables:

  • Clear executive reporting
  • Structured incident analysis
  • Defensive gap assessment
  • Risk modeling aligned with real-world adversary behavior
  • Improved communication between SOC, IR, and leadership

It bridges technical activity and strategic defense planning.


Why SECMONS Includes the Kill Chain Model 📎

SECMONS connects vulnerabilities, campaigns, and impact.

The Kill Chain provides a foundational framework for interpreting how individual techniques fit into larger adversary operations.

It supports structured intelligence analysis rather than isolated event tracking.


Authoritative References 📎

  • Lockheed Martin Cyber Kill Chain Whitepaper
  • MITRE ATT&CK Framework Documentation