Skip to main content
High Value Target
AboutWhy HVTMethodologyResearchTerms of UsePartnersContact
Book Advisory Session
AboutWhy HVTMethodologyResearchTerms of UsePartnersContact
Book Advisory Session

Framework View

Kill Chain Phases — Roles

Understand how High Value Target Roles function across pre-compromise, compromise, and post-compromise phases of an attack.

Provide Role FeedbackBack to Home
Kill Chain Phases — Roles editorial cover

Role-centric resilience across phases

Understanding which roles matter most at each kill chain phase enables targeted monitoring, training, and controls investment.

Topics covered

Phase 1Phase 2Phase 3

01

Pre-compromise: roles with external exposure and privileged access become primary targets during adversary reconnaissance and initial access.

02

Compromise: roles storing secrets or controlling communications determine how far an adversary can penetrate during active intrusion.

03

Post-compromise: roles with inhibit-restore or widespread presence authority enable adversary persistence and operational disruption.

Engage

Provide Role Feedback

The High Value Target Roles RFC is open. Contact the team to discuss role definitions and kill-chain phase intersections.

Provide Role Feedback

Continue the conversation

Build a more defensible resilience capability.

Contact High Value Target to discuss how this topic maps to your environment, operating model, and resilience priorities.

Book Advisory SessionExplore the framework
High Value Target

Understand what matters most. Control the blast radius.

Specialist cyber resilience advisory for critical assets, dependency mapping, operating-model design, and executive resilience capability.

Framework

Why HVTMethodologyDesign Principles

Research

STIXRolescAPT

Connect

PartnersContact

Legal

Terms of UsePrivacy Policy

Copyright ©2026 High Value Target. All rights reserved.

Direct contact with the High Value Target team