Skip to main content
High Value Target
AboutWhy HVTMethodologyResearchTerms of UsePartnersContact
Book Advisory Session
AboutWhy HVTMethodologyResearchTerms of UsePartnersContact
Book Advisory Session

Framework View

Kill Chain Phases — Terms of Use

Review how the High Value Target trademark and methodology terms apply across the kill chain phases.

Discuss UsageBack to Home
Kill Chain Phases — Terms of Use editorial cover

Kill chain and legal framework

The kill-chain view of HVT helps clarify how legal protections apply across each phase of an adversary's operation.

Topics covered

Phase 1Phase 2Phase 3

01

Pre-compromise: the methodology is openly available to help organizations identify critical assets before adversary targeting.

02

Compromise: attribution and trademark protections apply to any misuse of the HVT concept during compromise reporting.

03

Post-compromise: resilience reporting standards ensure accurate use of the methodology in post-incident analysis.

Engage

Discuss Usage

Contact High Value Target for clarification on trademark use, attribution, or permitted educational reuse.

Discuss Usage

Continue the conversation

Build a more defensible resilience capability.

Contact High Value Target to discuss how this topic maps to your environment, operating model, and resilience priorities.

Book Advisory SessionExplore the framework
High Value Target

Understand what matters most. Control the blast radius.

Specialist cyber resilience advisory for critical assets, dependency mapping, operating-model design, and executive resilience capability.

Framework

Why HVTMethodologyDesign Principles

Research

STIXRolescAPT

Connect

PartnersContact

Legal

Terms of UsePrivacy Policy

Copyright ©2026 High Value Target. All rights reserved.

Direct contact with the High Value Target team