top of page
THREAT PROFILES

Ten Threat Profiles that frame adversary operations through the eight Threat Operations Functions phases, anchored to the Intrusion Vault catalogs.

CAE_red_no bkg_01.png

The Intrusion 8 Threat Profiles define how adversaries commonly succeed across the same 10 domains addressed by the Defensible 10 Standards (D10S). Each profile is written for education and instruction only, emphasizing exposure conditions, compromise pathways, and operational outcomes that defenders can plan against and validate.

Intrusion 8 organizes each profile using the eight Threat Operations Functions phases: Initial Reconnaissance, Initial Compromise, Establish Foothold, Escalate Privileges, Internal Reconnaissance, Move Laterally, Maintain Presence, and Complete Mission. This structure helps Blue Teams connect threat realism to defensible design, detection planning, and verification and validation.

D10

Supported by:

I8_logo4.png

Training by:

new-1-blue-background_v2.png

Practitioner and Organizational Use

Intrusion 8 is for educational and instructional purposes only. Content is written to strengthen defensive readiness and professional practice. Intrusion 8 does not provide procedural guidance intended for misuse.

Commercial, Vendor, and Integration Use

The use, reproduction, or incorporation of the Intrusion Threat Profiles or their content within commercial products, software, tooling, managed services, or for-profit offerings requires a separate commercial integration or redistribution license issued by the Institute of Security Architecture United (ISAUnited.org).


This includes but is not limited to:

  • Integration into commercial or subscription-based platforms or software tools

  • Use in vendor-branded frameworks or automated compliance products

  • Redistribution of modified or adapted versions for resale or commercial benefit

 

Requests for commercial licensing or integration agreements should be directed to:  info@isaunited.org

© 2026 The Intrusion 8 Threat Profiles. Owned, operated, and maintained by the Institute of Security Architecture United (ISAUnited.org).

bottom of page