Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 886

Pyramid of Pain

What is Pyramid of Pain?

Pyramid of PainA model by David Bianco that ranks indicators of compromise by how painful it is for adversaries when defenders detect or block them.


The Pyramid of Pain, introduced by David Bianco in 2013, ranks indicators of compromise (IoCs) from trivial to costly for adversaries to change. From bottom to top: hash values (trivial), IP addresses (easy), domain names (simple), network and host artifacts (annoying), tools (challenging), and TTPs — tactics, techniques, and procedures (tough). Detecting low-pyramid indicators provides short-lived value because attackers rotate them quickly, while detecting tools and TTPs forces them to redesign their operations. The model is widely used to evaluate detection programs, prioritise behavioural analytics over signature-only approaches, and explain to leadership why investing in TTP-based detection (Sigma rules, EDR behaviour) yields more sustainable defence than blocking individual IPs or hashes.

Examples

  1. 01

    Writing a Sigma rule for kerberoasting behaviour rather than relying solely on hashes of past samples.

  2. 02

    Tracking an adversary's reuse of a custom in-memory loader (tool) across multiple campaigns.

Frequently asked questions

What is Pyramid of Pain?

A model by David Bianco that ranks indicators of compromise by how painful it is for adversaries when defenders detect or block them. It belongs to the Defense & Operations category of cybersecurity.

What does Pyramid of Pain mean?

A model by David Bianco that ranks indicators of compromise by how painful it is for adversaries when defenders detect or block them.

How does Pyramid of Pain work?

The Pyramid of Pain, introduced by David Bianco in 2013, ranks indicators of compromise (IoCs) from trivial to costly for adversaries to change. From bottom to top: hash values (trivial), IP addresses (easy), domain names (simple), network and host artifacts (annoying), tools (challenging), and TTPs — tactics, techniques, and procedures (tough). Detecting low-pyramid indicators provides short-lived value because attackers rotate them quickly, while detecting tools and TTPs forces them to redesign their operations. The model is widely used to evaluate detection programs, prioritise behavioural analytics over signature-only approaches, and explain to leadership why investing in TTP-based detection (Sigma rules, EDR behaviour) yields more sustainable defence than blocking individual IPs or hashes.

How do you defend against Pyramid of Pain?

Defences for Pyramid of Pain typically combine technical controls and operational practices, as detailed in the full definition above.

Related terms