Now that we've mapped the Cyber Kill Chain and OODA, we can now start looking at how this applies to the OPSEC process:
- Identification of critical information and systems:
- Where are my crown jewels and what systems are supporting them?
- Analysis of threats:
- Who wants our information and why?
- How do they typically operate?
- Analysis of vulnerabilities:
- Where are the gaps in our defenses?
- What are the capabilities that we lack?
- Assessment of risk:
- What is the probability of exploitation of vulnerabilities that may impact our organization's critical systems?
- Application of appropriate countermeasures:
- How can we be proactive in addressing potential exploitation opportunities?
- How do we monitor, communicate, and mitigate at each step of the Cyber Kill Chain?
By understanding and evaluating step 1 to step 4, we can now look at the Cyber Kill Chain to answer step 5: