CALL FOR SUB-STANDARDS IS OPEN
Intrusion 8 Phases
The Intrusion Eight presents a structured progression model that explains how adversaries move from initial reconnaissance to mission completion. Designed for ethical education, simulation, and professional awareness, it frames intrusion as a disciplined sequence rather than chaos, helping practitioners understand adversary behavior without promoting misuse.


INTRUSION VAULT
The Intrusion Vault, inside the ISAUnited.org Library
The Intrusion Vault is Intrusion 8’s curated library of structured adversary intelligence, written to support responsible defense. It translates real intrusion behaviors into reference catalogs that help teams identify exposure conditions, map likely impact paths, and improve defensive design and response. The Vault is housed in the ISAUnited.org Library to keep Intrusion 8 aligned with professional standards, governance, and legitimate instruction.
Threat Profiles
Red Team intelligence that pressures every Defensible 10 domain.
Intrusion8 Threat Profiles translate real adversary operations into disciplined, domain-aligned profiles that defenders can adopt. Each profile maps to one Defensible 10 Standard and frames intrusion progression through the eight Threat Operations Functions (TOF) phases, emphasizing conditions, outcomes, and observable traces rather than instructions.
-
Ten profiles, TP01 through TP10, aligned one to one with D01 through D10
-
Anchored to the Intrusion Vault: Threat Actors, Threat Vectors, and Threat Tools
-
Built for authorized education, simulation, and defensive planning

Coming Soon 2026

