top of page
Team Collaborating Late

Intrusion Vault

Curated threat intelligence catalogs for defensive readiness
Threat Catalogs

The Intrusion Vault catalogs are written to support condition- and outcome-based analysis, not narratives or tool-driven hype. Each catalog uses a consistent structure so teams can compare entries, support verification and validation, and keep defensive assumptions aligned with real intrusion activity. This is how Intrusion 8 helps keep the Defensible 10 Standards in check through a threat-informed counter perspective across the same ten domains.

TA_Cat_icon1.png

THREAT ACTOR CATALOG

Defender focused threat actor intelligence, curated for clarity and use.

A curated catalog of documented adversary profiles used for instruction and defensive readiness. Each entry emphasizes motivations, behaviors, targeting patterns, and operational outcomes that defenders must anticipate.
 

  • Profile-driven entries with aliases and assessed intent

  • Behavior mapping for intrusion reasoning and defense planning

  • Designed for analysts, architects, and incident responders

cyber_analyst_TA_vault1.png

THREAT VECTOR CATALOG

Map exposure conditions to impact paths, so defenses can be prioritized.

A structured view of compromise pathways that connect exposure conditions to impact paths. Built to help teams identify where intrusions succeed, then prioritize architecture and control improvements.
 

  • Entry surface, exposure condition, and impact path structure

  • Works as a bridge between Red Team insight and Blue Team design

  • Useful for tabletop exercises and capability assessments

cyber_analyst_TV_vault1.png

THREAT TOOLS CATALOG

Tools observed in real intrusions, documented for defensive readiness.

A reference catalog that documents tools seen in real intrusions and how they support adversary operations. Focused on awareness and detection planning, not procedural instruction.
 

  • Tool purpose and operational function alignment

  • Detection and monitoring considerations for defenders

  • Supports threat-informed validation and training scenarios

cyber_analyst_TT_vault2.png
Engineering-grade cybersecurity is a public safety expectation

Society depends on digital systems that must remain trustworthy under stress. The Defensible 10 Standards and the Defensible Loop exist to strengthen that trust through disciplined practice and proof.

Supported by:

I8_logo4.png

Training by:

new-1-blue-background_v2.png

Practitioner and Organizational Use

Intrusion 8 is for educational and instructional purposes only. Content is written to strengthen defensive readiness and professional practice. Intrusion 8 does not provide procedural guidance intended for misuse.

Commercial, Vendor, and Integration Use

The use, reproduction, or incorporation of the Intrusion Threat Profiles or their content within commercial products, software, tooling, managed services, or for-profit offerings requires a separate commercial integration or redistribution license issued by the Institute of Security Architecture United (ISAUnited.org).


This includes but is not limited to:

  • Integration into commercial or subscription-based platforms or software tools

  • Use in vendor-branded frameworks or automated compliance products

  • Redistribution of modified or adapted versions for resale or commercial benefit

 

Requests for commercial licensing or integration agreements should be directed to:  info@isaunited.org

© 2026 The Intrusion 8 Threat Profiles. Owned, operated, and maintained by the Institute of Security Architecture United (ISAUnited.org).

bottom of page