Transcript
Sponsor/Announcer (0:02)
You're listening to the Cyberwire network, powered by N2K. And now a word from our sponsor. The Johns Hopkins University Information Security Institute is seeking qualified applicants for its innovative Master of Science in Security Informatics degree program. Study alongside world class interdisciplinary experts and gain unparalleled educational research and professional experience in information security and assurance. Interested U.S. citizens should consider the Department of Defense's Cyber Service Academy program, which covers tuition, textbooks and a laptop, as well as providing a $34,000 additional annual stipend. Apply for the fall 2026 semester and for this scholarship by February 28th. Learn more at CS JHU. Edu MSSI.
Rick Howard (1:18)
The word is intrusion kill.
Rick Howard (1:20)
Ch.
Rick Howard (1:25)
Spelled intrusion as in a breach of a network or system, kill as in to terminate or put an end to and chain as in a sequence. Definition A cybersecurity first principle strategy focused on disrupting known adversary activity and at one of several phases of an attack sequence. Example sentence the organization stopped the attack at the installation phase of the intrusion kill chain. Origin and context 2010 was a big year in cybersecurity. The world learned about the US Israeli Cyber Campaign Olympic Games, commonly referred to as Stuxnet, designed to slow down or cripple the Iranian's nuclear bomb production capability. Google sent out shockwaves when it announced that it had been hacked by the Chinese government. John Kinderwog, while working for Forrester, published his seminal paper no More Chewy Sinners, introducing the zero trust Model of information Security. And Lockheed Martin published their groundbreaking paper Intelligence Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains, written by Eric Hutchins, Michael Clauffert, and Rohan Amin. I can't emphasize enough the size of the seismic shift in cyber defense thinking in the general public after the Lockheed Martin paper came out. Before the paper, we were all consumed with the idea that we were trying to prevent bad technical things from happening to and inside our networks using a model that we call Defense in Depth. We were preoccupied with stopping malware and zero day exploits and bad URL links without any consideration of how cyber adversaries actually conducted their business from beginning to end. The common notion was that the adversary only had to be lucky one time to have success, like using a zero day exploit, while the defender had to be precisely correct, protected against all the possible zero day exploits all the time. The Lockheed Martin paper made the case that this just wasn't true. The authors demonstrated that adversaries had to string a series of actions together in order to be successful. All the defender had to do was break the sequence somewhere along that chain, the kill chain, which completely reversed the common notion. According to the authors, network defense techniques which leverage knowledge about these adversaries can create an intelligence feedback loop, enabling defenders to establish a state of information superiority which decreases the adversary's likelihood of success with each subsequent intrusion attempt. The bad news is that although the Lockheed Martin kill chain model is brilliant as a conceptual model, it's severely lacking in one major aspect operations. There isn't a lot of detail in the original white paper about how to operationalize the concept. Things like how to collect adversary playbook intelligence, analyze the data, make prudent decisions about how to prevent playbook actions, and actually deploy the mitigation plan are left to the reader as an exercise. But that's a nitpick. The paper wasn't designed for that purpose. The authors disrupted the industry by upending commonly understood best practices and proposed a strategy that was better suited to preventing material impact to our organizations. The operations void would be filled with other big thinkers from MITRE and their ATT and CK framework and the Department of Defense with their diamond model Nerd reference. At the Integrated Cyber Conference in 2018 hosted by the Johns Hopkins Applied Physics Laboratory, yours truly gave the keynote speech about the future of network defense. In this section I discussed the kill chain elements from the Lockheed Martin intrusion Kill Chain paper.
![Identity Fabric (noun) [Word Notes] - Hacking Humans cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F733a4468-9faf-11f0-be7f-93710ca3b958%2Fimage%2F441b0ca2db080b93b935568d381ce462.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)