Skip to main content
High Value Target
AboutWhy HVTMethodologyResearchTerms of UsePartnersContact
Book Advisory Session
AboutWhy HVTMethodologyResearchTerms of UsePartnersContact
Book Advisory Session

Framework View

Kill Chain Phases — HVT

Map High Value Target attributes across kill chain phases to understand where advanced adversaries concentrate their targeting effort.

Request Free CopyBack to Home
Kill Chain Phases — HVT editorial cover

HVT attributes across kill chain phases

The kill-chain view makes HVT attributes actionable by connecting each attribute category to the phase where it matters most.

Topics covered

Phase 1Phase 2Phase 3

01

Pre-compromise: stealthiness, internal prospecting, and external exposure define how adversaries identify and value HVTs before initial compromise.

02

Compromise: stores secrets, infiltrates comms, and blindsides defense — attributes that determine how HVTs fail under active intrusion.

03

Post-compromise: tamper-prone, inhibit restoration, stores data, and widespread presence describe how HVTs enable adversary persistence and impact.

Engage

Request Free Copy

Connect with High Value Target to request the overview deck or discuss how HVT kill-chain mapping applies to your environment.

Request Free Copy

Continue the conversation

Build a more defensible resilience capability.

Contact High Value Target to discuss how this topic maps to your environment, operating model, and resilience priorities.

Book Advisory SessionExplore the framework
High Value Target

Understand what matters most. Control the blast radius.

Specialist cyber resilience advisory for critical assets, dependency mapping, operating-model design, and executive resilience capability.

Framework

Why HVTMethodologyDesign Principles

Research

STIXRolescAPT

Connect

PartnersContact

Legal

Terms of UsePrivacy Policy

Copyright ©2026 High Value Target. All rights reserved.

Direct contact with the High Value Target team