Cybersecurity Reference > Glossary
What is a Cyber Kill Chain?
Developed by Lockheed Martin's security team, it breaks attacks into seven stages: reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives. During reconnaissance, attackers gather information about their target—everything from email addresses to network configurations. They then weaponize this intelligence by creating malicious code or documents. Delivery gets that weapon to the victim, often through phishing emails or compromised websites. Exploitation takes advantage of vulnerabilities to execute the attacker's code, followed by installation, where malware establishes persistence on the system. Command and control establishes communication between the compromised system and the attacker's infrastructure. Finally, actions on objectives is where attackers accomplish their actual goals, whether that's stealing data, disrupting operations, or establishing long-term access.
The value of this model lies in how it changes defensive thinking. Instead of focusing solely on keeping attackers out, security teams can identify opportunities to disrupt attacks at any stage. Email filters might catch malicious attachments during delivery. Endpoint detection tools can spot exploitation attempts. Network monitoring can reveal unusual command and control traffic. Breaking the chain at any point stops the attack, which makes layered defenses far more effective than relying on perimeter security alone.
Origin
Before this model gained traction, most security approaches focused on prevention at the network boundary. Organizations invested heavily in firewalls and antivirus software, treating security as a binary state: either attackers were kept out or they weren't. The Kill Chain reframed this thinking by showing that attacks unfold over time through multiple stages, each offering opportunities for detection and response.
The framework quickly became influential in enterprise security and government circles, particularly as advanced persistent threats demonstrated the limitations of perimeter-only defenses. While some practitioners have since developed alternative models—like MITRE ATT&CK, which offers more granular tactical detail—the Kill Chain remains foundational. It introduced the crucial concept that defenders don't need perfect prevention; they just need to break the chain somewhere before attackers reach their objectives.
Why It Matters
The framework also helps security teams communicate more effectively, both internally and with executives. Instead of discussing abstract vulnerabilities or technical details, teams can explain where specific controls fit into stopping real attack progressions. This makes it easier to justify security investments and prioritize initiatives based on which stages of the chain have the weakest coverage.
Perhaps most importantly, the Kill Chain shifts focus from prevention alone to detection and response across multiple stages. Organizations that assume breaches will occur—and prepare to detect and disrupt them mid-progression—fare better than those that invest everything in keeping attackers out. This philosophical shift has become central to modern security strategies, from zero trust architectures to extended detection and response platforms. The model reminds defenders that they have multiple opportunities to stop attacks, even after initial compromise.
The Plurilock Advantage
We don't just identify gaps—we help implement layered controls that disrupt attacks at multiple points. Our team includes former intelligence professionals who understand how sophisticated attackers actually operate, not just how frameworks describe them.
Whether you need penetration testing to validate exploitation defenses, incident response when the chain has progressed too far, or strategic planning to build comprehensive coverage, we mobilize quickly with practitioners who've defended against real-world attack chains in government and enterprise environments.
.
Need Help Mapping Your Threat Landscape?
Plurilock's security experts can help you implement comprehensive kill chain defenses.
Get Kill Chain Protection → Learn more →




