01
Pre-compromise: stealthiness, internal prospecting, and external exposure define how adversaries identify and value HVTs before initial compromise.
Framework View
Map High Value Target attributes across kill chain phases to understand where advanced adversaries concentrate their targeting effort.
01
Pre-compromise: stealthiness, internal prospecting, and external exposure define how adversaries identify and value HVTs before initial compromise.
02
Compromise: stores secrets, infiltrates comms, and blindsides defense — attributes that determine how HVTs fail under active intrusion.
03
Post-compromise: tamper-prone, inhibit restoration, stores data, and widespread presence describe how HVTs enable adversary persistence and impact.