Indicators of Compromise
Indicators of Compromise are clues or pieces of evidence that suggest a computer system or network may have been breached or is currently under attack. These can include things like unusual network traffic, unexpected changes to system settings, or strange login attempts. Security teams use these indicators to detect and investigate potential security incidents.
Indicators of Compromise are technical artifacts or observables, such as file hashes, IP addresses, domain names, network traffic anomalies, privileged account irregularities, geographic irregularities in access patterns, and unexpected system configuration changes, that suggest an attack is imminent, currently underway, or that a compromise may have already occurred. Observed on networks or within operating systems, IoCs are typically collected and analyzed in the context of computer forensics and threat intelligence to support detection, triage, and incident response. IoCs are commonly shared in structured formats to enable automated correlation across security tools, though their utility diminishes as adversaries rotate infrastructure and techniques. It is important to note that IoCs are generally reactive in nature, representing known-bad artifacts from previously observed attacks, and may not detect novel threats or adversary behaviors that have not yet been cataloged.
Why it matters
Indicators of Compromise serve as the foundational detection mechanism for identifying security breaches across enterprise environments. Without a structured approach to collecting and correlating IoCs, organizations may fail to detect that an intrusion has occurred until the damage is severe. Because IoCs encompass a wide range of observable artifacts (file hashes, suspicious IP addresses, anomalous login patterns, unexpected configuration changes), they provide security teams with actionable signals that can be used to initiate triage, containment, and remediation workflows. Their importance is amplified in environments with complex software supply chains, where a compromise in one component can propagate across many systems before it is noticed.
However, it is critical to understand that IoCs are predominantly reactive in nature. They represent known-bad artifacts derived from previously observed attacks, which means they are most effective against threats that have already been cataloged and shared within the security community. Novel attack techniques or adversaries who frequently rotate their infrastructure (changing IP addresses, domain names, or file signatures) can evade IoC-based detection entirely. This limitation underscores the need to pair IoC-driven detection with behavioral analysis and proactive threat hunting.
For application security practitioners specifically, IoCs matter because they can surface evidence of compromised dependencies, tampered build artifacts, or unauthorized modifications to deployment configurations. Monitoring for IoCs at the application layer, such as unexpected outbound network traffic from a service or anomalous privilege escalations, can help teams identify supply chain compromises that static analysis or code review alone would not catch.
Who it's relevant to
Inside IoC
Common questions
Answers to the questions practitioners most commonly ask about IoC.