Cybersecurity Reference > Glossary
What is an Attack Lifecycle?
It's less a rigid script than a general pattern—most sophisticated attacks follow a similar arc even if the specific tactics vary widely.
The journey typically starts with reconnaissance, where attackers learn everything they can about their target without touching it directly. Then comes initial access, the breach itself. Once inside, attackers work to establish persistence so they can return even if discovered. They escalate privileges to gain administrative control, move laterally to find valuable systems, collect and extract data, and finally attempt to hide evidence of what they've done. Some frameworks break this down into more granular phases like weaponization and delivery, but the core progression remains consistent.
This framework matters because it gives defenders a structured way to think about where and how to intervene. Different security controls address different stages—threat intelligence counters reconnaissance, endpoint protection blocks initial access, behavioral analytics catches lateral movement. By mapping your defenses to each phase, you can spot the gaps. The goal isn't perfection at any single stage but sufficient friction across multiple stages that attackers either fail outright or take so long that detection becomes inevitable.
Origin
Other models followed. MITRE introduced the ATT&CK framework in 2013, offering a more granular, tactics-based view that cataloged specific techniques adversaries use at each stage. Where the Kill Chain was linear, ATT&CK acknowledged that real attacks loop back, skip stages, and adapt. The industry debate shifted from whether to use lifecycle models to which one best fit different environments and threat profiles.
What's evolved most is the recognition that these frameworks are descriptive, not prescriptive. Attackers don't follow playbooks religiously. But the stages capture something real about how intrusions unfold, and that regularity—even with variation—gives defenders a fighting chance to predict where adversaries will go next and what they'll need to get there.
Why It Matters
Understanding the lifecycle helps security teams move from reactive to anticipatory defense. If you know attackers who've gained initial access will likely try to establish persistence next, you can watch for those behaviors specifically—unusual scheduled tasks, modifications to startup folders, new service installations. This progression also helps with resource allocation. Organizations with limited budgets can prioritize controls that address the stages where they're most vulnerable or where attackers typically dwell longest before detection.
The framework also improves communication. When a security team tells executives "we detected lateral movement during the privilege escalation phase," everyone shares a mental model of where in the attack sequence this occurred and what might come next. That shared language makes it easier to coordinate response, explain risk, and justify investments in controls that address specific lifecycle gaps.
The Plurilock Advantage
We don't just tell you where gaps exist; we demonstrate them, then help you close them with practical controls that address your specific environment and threat profile.
That's defense informed by offense, delivered by practitioners who've operated on both sides.
.
Need Help Understanding Your Attack Surface?
Plurilock's security experts can map your complete attack lifecycle vulnerabilities.
Analyze My Attack Surface → Learn more →




