The adversary methodology
Just like having a framework to cycle through, from conception to completion, to identify threats is a must-have, employing a common adversary methodology framework within a team needs to be set. This particular method involves the steps that an adversary takes to compromise the environment and complete their objective. The most common model that's used is the Lockheed Martin Cyber Kill Chain, as shown in the following diagram:
This particular kill chain is simply a chain that the adversary builds as they perform offensive actions. With each step, a new link is added. If they get to the end, then they have achieved their goal, whatever it may be, and are considered successful. This typically means that the cyber defenders have not been successful and that the business's information system confidentiality, integrity, or availability has been compromised. From a defensive standpoint, the...