About the Intrusion 8 Project
ISAUnited’s Red Team Intelligence for Blue Team Strength | Know the Exposure
Mission
Strengthening defenders through responsible intelligence.

Project Overview
Intrusion 8 is ISAUnited’s Red Team Intelligence division, built to help defenders understand how modern intrusions succeed across enterprise and cloud environments. The project exists for education and instruction only, with a deliberate focus on conditions and outcomes that inform defensive architecture, detection, and response. Intrusion 8 also helps keep the Defensible 10 Standards in check by providing a counter set of ten domain threat profiles and curated catalogs that support verification and validation of defensive priorities and engineering outcomes.

(Click to expand image)
Objectives
Intrusion 8 is designed to:
-
Clarify domain exposure conditions that enable compromise across modern environments.
-
Frame adversary operations using the 8 Threat Operations Functions phases (Initial Reconnaissance, Initial Compromise, Establish Foothold, Escalate Privileges, Internal Reconnaissance, Move Laterally, Maintain Presence, Complete Mission) so defenders can reason about how intrusions progress and where to interrupt them.
-
Translate adversary behavior into intelligence usable by defenders to support readiness, prioritization, and decision-making across architecture, detection, and response.
-
Maintain governed intelligence catalogs that remain consistent, curated, and continuously improved over time, including the Threat Actor Catalog, Threat Vectors Catalog, and Threat Tools Catalog.
-
Strengthen Blue Team capabilities by connecting Red Team insight to defensive design, detection planning, and response preparation, aligned to the Defensible 10 domains.
-
Support verification and validation by grounding defensive improvements in real-world intrusion patterns and observable outcomes, helping keep the Defensible 10 Standards in check through a threat-informed counter perspective.
-
Educate practitioners responsibly with content that improves awareness and readiness without providing procedural guidance that could enable misuse.
-
Reinforce the Defensible 10 Standards by publishing ten domain threat profiles that mirror the ten domains and help validate defensive priorities and engineering outcomes.


What Intrusion 8 Provides
10 Domain Threat Profiles that summarize common exposure conditions, compromise pathways, and defensive implications across ten security domains.
The Intrusion Vault, available through ISAUnited membership in the ISAUnited.org Library, houses and maintains three curated reference catalogs.
-
Threat Actor Catalog: Documented adversary profiles written for instruction and defensive readiness.
-
Threat Vectors Catalog: Structured compromise pathways that connect entry surfaces, exposure conditions, and impact paths.
-
Threat Tools Catalog: A defender-focused reference of tools observed in real-world intrusions, documented for awareness and detection planning.
