Strategy Implementation
In the previous chapter, I discussed numerous cybersecurity strategies. In this chapter, I’ll take one of those strategies and illustrate how it can be implemented in a real IT environment. The objective is to take the theoretical and make it a little more real for you. I’ll provide some tips and tricks I’ve learned in my career along the way.
In this chapter we will cover the following:
- What is the Intrusion Kill Chain?
- Some ways that the traditional Kill Chain model can be modernized
- Factors to consider when planning and implementing this model
- Designing security control sets to support this model
Since the MITRE ATT&CK® framework is also popular, very useful, and complementary to the Intrusion Kill Chain, I’ll point out some of the areas where it is helpful.