Kill Chain
A kill chain is a model that describes the sequential stages an attacker typically follows to carry out an attack, from initial target identification through to the final objective. In cybersecurity, the model is used to help defenders understand, detect, and interrupt attacks at various points before they succeed. By mapping attacker behavior to distinct phases, security teams can identify where controls may be applied to break the chain.
Originally a military concept identifying the structured phases of an attack (target identification, force dispatch, decision, and engagement), the kill chain was adapted into cybersecurity as a framework for modeling and countering intrusion activity. The Cyber Kill Chain, developed as part of an Intelligence Driven Defense model, describes the stages a threat actor progresses through during a cyberattack, typically spanning reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives. In application security and supply chain contexts, the framework is used to structure threat modeling exercises and defensive controls by identifying which phase of an attack a given control addresses. The model is most useful for characterizing multi-stage, targeted intrusions; it may not fully represent attack patterns that do not follow a linear progression, and applying it requires contextual knowledge of the specific threat actors and environments involved.
Why it matters
Understanding the sequential stages of an attack gives security teams the ability to intervene before an attacker reaches their final objective. Rather than treating a breach as a single event, the kill chain model frames an intrusion as a series of dependent steps, each of which represents an opportunity to detect, delay, or stop the attack. This shift in perspective encourages defenders to build layered controls that address multiple phases rather than relying on any single prevention mechanism at the perimeter.
In application security and software supply chain contexts, the kill chain helps practitioners recognize that compromising a target typically requires an attacker to complete several intermediate steps, such as identifying a vulnerable dependency, weaponizing it, delivering a malicious payload, and establishing persistence. Each of those steps may leave observable signals or can be disrupted by targeted controls. For example, supply chain attacks such as the SolarWinds incident demonstrated how adversaries progress through distinct phases, including access to a build environment, trojanization of software, and staged command-and-control activity, before achieving their objectives against downstream targets.
Without a structured model like the kill chain, security programs may focus disproportionately on endpoint detection or perimeter controls while leaving earlier or later phases unaddressed. Mapping existing controls to kill chain phases can reveal gaps in defensive coverage and help prioritize where additional investment or tooling is needed.
Who it's relevant to
Inside Kill Chain
Common questions
Answers to the questions practitioners most commonly ask about Kill Chain.