Understanding attacks
To understand the steps you should take to investigate a potential compromise, it’s first important to understand the anatomy of an attack, how the industry has defined it over time, as well as how it has evolved to meet the ever-shifting need. Though not all of this will be specifically relevant to MDE and its functionality, it will act as a useful foundation for later concepts.
The Cyber Kill Chain as a framework
Originally derived from a military model, Lockheed Martin originally coined the term Cyber Kill Chain® in a report compartmentalizing common attacks of the time into specific stages. This separation of stages provided security leaders and engineers with a logical framework of how to think about an attack, as well as specific approaches to detection, prevention, and response at each stage. Though the original model has limitations (such as being much too focused on network perimeters for modern cloud approaches), it does provide a...