Skip to main content
High Value Target
AboutWhy HVTMethodologyResearchTerms of UsePartnersContact
Book Advisory Session
AboutWhy HVTMethodologyResearchTerms of UsePartnersContact
Book Advisory Session

Design Principles

Methodology Principles

The High Value Target methodology is impact-led, evolvable, quantifiable, community-informed, and grounded in authoritative sources.

Discuss the PrinciplesBack to Home
Methodology Principles editorial cover

Design intent

These principles explain why High Value Target is framed as a community-oriented, fit-for-use extension rather than a closed proprietary standard.

Topics covered

High Value Target Design Principles

01

The framework focuses on inherent impact, not just mitigating controls already in place.

02

It produces quantifiable labels and measures tied to the value adversaries seek in a target.

03

It is intended as an evolvable extension of sources such as NIST, MITRE, and the World Economic Forum.

High Value Target Design Principles

The methodology focuses on inherent impact , hence on these attributes that are intrinsic to the object* itself and do not depend on mitigating controls in place;

The attributes of each object are subject to change , hand in hand with major technological progress or evolution of cyber adversaries’ sophistication;

The methodology provides quantitative measures in terms of low / moderate / high value that an adversary aims to seek for and then leverage;

The methodology produces an outcome in form of a label which can be intended as a binary value about whether the object is or isn’t a High Value Target;

The methodology is an evolvable product which could be leveraged in a multitude of contexts like risk assessments, threat modeling, security operations and more;

The High Value Target objects and attributes are for the community hence feedback is encouraged and considered in order to strengthen the methodology and ensure fit-for-use;

The High Value Target methodology is an extension of authoritative publications ranging from NIST, MITRE, WEF and more. It is not meant to be a proprietary framework of its own.

* An object can be an asset (system, application), role, third party, data.

Engage

Discuss the Principles

Contact High Value Target if you want to apply the methodology in assessments, threat modeling, security operations, or resilience reporting.

Discuss the Principles

Continue the conversation

Build a more defensible resilience capability.

Contact High Value Target to discuss how this topic maps to your environment, operating model, and resilience priorities.

Book Advisory SessionExplore the framework
High Value Target

Understand what matters most. Control the blast radius.

Specialist cyber resilience advisory for critical assets, dependency mapping, operating-model design, and executive resilience capability.

Framework

Why HVTMethodologyDesign Principles

Research

STIXRolescAPT

Connect

PartnersContact

Legal

Terms of UsePrivacy Policy

Copyright ©2026 High Value Target. All rights reserved.

Direct contact with the High Value Target team