Skip to main content
High Value Target
AboutWhy HVTMethodologyResearchTerms of UsePartnersContact
Book Advisory Session
AboutWhy HVTMethodologyResearchTerms of UsePartnersContact
Book Advisory Session

Flagship Framework

The trusted source in critical asset identification for increased cyber resilience.

High Value Targets are the systems, roles, third parties, and data collections that advanced adversaries pursue because compromise creates outsized operational impact.

High Value Target methodologyContact the High Value Target team
Strategic advisory meeting

Why HVT

HVT analysis extends standard business-impact thinking with the attacker's perspective, so resilience investments follow the assets most likely to amplify disruption.

What are the High Value Targets?

High Value Targets are information systems, roles, third parties, and data for which unauthorized access, use, disclosure, disruption, modification, or destruction would significantly affect an organization's ability to perform its mission.

They often contain sensitive controls, unique concentrations of trust, critical recovery capabilities, or defensive functions that attackers can weaponize to expand blast radius.

In practice, HVTs frequently cut across traditional crown-jewel thinking by emphasizing attacker value, dependency spread, and mission survivability.

Why are HVTs important?

Current cyber resilience and business-impact analysis practices often lack a clear method for determining the value an advanced adversary places on specific targets.

By identifying HVTs, organizations can prioritize defensive investment without over-protecting some assets and under-protecting others.

Once HVTs are identified, secured, and governed continuously, the organization's cyber resilience posture becomes more measurable, more targeted, and more defensible.

Framework foundation

High Value Target design principles

  • Open to the community and evolvable over time.
  • Focused on the inherent impact of assets rather than blanket control coverage.
  • Produces a quantifiable outcome for resilience planning and prioritization.
  • Aligned to authoritative sources such as NIST and MITRE.
Explore the principles

Expert perspective

"The High Value Target methodology is exactly what organizations and their leaders need to be thinking about as they seek to defend themselves, their critical infrastructure and their business."

"It is no longer good enough to try to defend everything. If you try to defend everything, you defend nothing."

This is the direction resilience programs need to move, and High Value Target provides a practical path.

John Felker

Former Assistant Director, United States Cybersecurity and Infrastructure Security Agency (CISA)

Defining High Value Targets

Categories of HVTs

Critical infrastructure targets tied directly to mission continuity.

Control-plane targets containing sensitive configurations and instructions.

Cyber-defense targets providing protective, investigative, or response capabilities.

Informational-value targets containing data or trust relationships with outsized importance.

Pre-compromise

  • Stealthiness: the target could provide an adversary with the ability to bypass detection tools.
  • Internal prospecting: the target could provide an adversary visibility into the control plane.
  • External exposure: the asset could be exposed in accessible zones for initial compromise.

Compromise

  • Stores secrets: the asset could expose credentials, keys, or trust relationships.
  • Infiltrate comms: the asset could provide access to defender communication channels.
  • Blindside defense: the asset could impair investigative capabilities and defensive visibility.

Post-compromise

  • Tamper prone: the asset can be weaponized to support malicious actions.
  • Inhibit restoration: the asset can disrupt backup and recovery capability.
  • Widespread presence: the asset enables dynamic footholds and sustained operational impact.
Alignment to the Unified Kill Chain

Business world

What is cyber resilience?

Cyber resilience is the ability of an organization to transcend stresses, failures, hazards, and threats to cyber resources so the organization can confidently pursue its mission and maintain its desired way of operating.

Technical world

From a technical perspective, cyber resilience extends cybersecurity by emphasizing the ability to anticipate, withstand, recover from, and adapt to adverse conditions, attacks, or compromises on cyber resources.

High Value Target methodology is grounded in NIST 800-160 and MITRE CREF, connecting those standards to practical prioritization of critical assets.

Cyber Resilience Manifesto

NIST SP 800-160 v2 and how High Value Target aligns to it

Cyber resiliency engineering is intended to help reduce mission, business, organizational, enterprise, or sector risk of depending on cyber resources. High Value Target operationalizes that idea by making critical-asset prioritization explicit and adversary-aware.

Focus on critical assets

  • Appendix E centers contingency, continuity, and operational resilience around critical assets.
  • Adversary value is explicitly relevant when determining which attributes make an asset critical or high value.
  • HVT analysis complements IT BIA and resilience planning by prioritizing the assets attackers value most.

Represent the adversary perspective

  • NIST calls for identifying high-value primary and secondary targets from the adversary's viewpoint.
  • Attack scenarios can be complemented by scenarios targeting critical or high-value assets.
  • Assets that appear low priority internally can still be high-value targets for an adversary.
Link to NIST 800-160 v2

Who retains the knowledge for High Value Targets?

The Cyber Resilience Officer should be accountable for the organization's ability to manage cyber resilience and for ensuring HVTs are identified, protected, assessed, and governed.

That role requires direct board access, authority over resilience priorities, and the resources necessary to coordinate strategy, training, and enforcement.

The responsibilities must be formally defined, documented, and operationalized so HVT knowledge is preserved beyond individual teams or incidents.

Cyber Resilience Officer role and skills

Next step

Ready to identify your critical assets?

Connect with High Value Target to discuss critical asset identification, resilience operating models, or the HVTM methodology in your environment.

Connect With Our TeamRequest the overview
High Value Target

Understand what matters most. Control the blast radius.

Specialist cyber resilience advisory for critical assets, dependency mapping, operating-model design, and executive resilience capability.

Framework

Why HVTMethodologyDesign Principles

Research

STIXRolescAPT

Connect

PartnersContact

Legal

Terms of UsePrivacy Policy

Copyright ©2026 High Value Target. All rights reserved.

Direct contact with the High Value Target team