Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 265

Cyber Kill Chain

What is Cyber Kill Chain?

Cyber Kill ChainLockheed Martin's seven-stage model that describes how a targeted intrusion progresses from reconnaissance to actions on objectives.


The Cyber Kill Chain, published by Lockheed Martin in 2011, breaks an intrusion into seven sequential phases: reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives. The model encourages defenders to detect, deny, disrupt, degrade, deceive, or destroy adversary activity at each step, because breaking any single link prevents the campaign from succeeding. It was one of the first widely adopted threat-centric frameworks and remains useful for mapping defences, prioritizing telemetry, and communicating incident timelines. Critics note it fits classic malware-delivered intrusions better than insider abuse, cloud-native attacks, or low-noise espionage; many teams now combine it with MITRE ATT&CK.

Examples

  1. 01

    Mapping a phishing-to-ransomware incident across the seven phases to identify which controls failed.

  2. 02

    Aligning EDR, email security, and network defences to specific kill-chain stages.

Frequently asked questions

What is Cyber Kill Chain?

Lockheed Martin's seven-stage model that describes how a targeted intrusion progresses from reconnaissance to actions on objectives. It belongs to the Defense & Operations category of cybersecurity.

What does Cyber Kill Chain mean?

Lockheed Martin's seven-stage model that describes how a targeted intrusion progresses from reconnaissance to actions on objectives.

How does Cyber Kill Chain work?

The Cyber Kill Chain, published by Lockheed Martin in 2011, breaks an intrusion into seven sequential phases: reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives. The model encourages defenders to detect, deny, disrupt, degrade, deceive, or destroy adversary activity at each step, because breaking any single link prevents the campaign from succeeding. It was one of the first widely adopted threat-centric frameworks and remains useful for mapping defences, prioritizing telemetry, and communicating incident timelines. Critics note it fits classic malware-delivered intrusions better than insider abuse, cloud-native attacks, or low-noise espionage; many teams now combine it with MITRE ATT&CK.

How do you defend against Cyber Kill Chain?

Defences for Cyber Kill Chain typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Cyber Kill Chain?

Common alternative names include: Lockheed Martin Kill Chain, Intrusion Kill Chain.

Related terms

See also