THREAT PROFILES
Ten Threat Profiles that frame adversary operations through the eight Threat Operations Functions phases, anchored to the Intrusion Vault catalogs.

The Intrusion 8 Threat Profiles define how adversaries commonly succeed across the same 10 domains addressed by the Defensible 10 Standards (D10S). Each profile is written for education and instruction only, emphasizing exposure conditions, compromise pathways, and operational outcomes that defenders can plan against and validate.
Intrusion 8 organizes each profile using the eight Threat Operations Functions phases: Initial Reconnaissance, Initial Compromise, Establish Foothold, Escalate Privileges, Internal Reconnaissance, Move Laterally, Maintain Presence, and Complete Mission. This structure helps Blue Teams connect threat realism to defensible design, detection planning, and verification and validation.
