Actor-Centric Defensive Prioritization · Methodology

Defensive priorities
shaped by adversary intent,
not compliance inertia.

ACDP is a prioritization methodology that sits one level above ATT&CK, NIST, and FAIR. It uses their outputs as inputs and produces a reasoned ordering of defensive actions against a specific adversary - based on how much each action disrupts that adversary's strategy and how much damage it prevents if that disruption fails.

Framework Level Decision Layer
Scoring Axes 4 dimensions
Output Priority Index
Status v1.0 Released
01 - CONCEPT

If priorities don't shift with intent,
they are not priorities.

Most defensive prioritization happens implicitly - inherited from compliance frameworks, risk heat maps, or executive preference. When attacker intent shifts, those prioritizations rarely shift with it. ACDP exists to make prioritization explicit, defensible, and actor-aware. It does not replace ATT&CK or NIST. It operates above them, turning their outputs into ranked action.

PI = (ADV × wa) + (IRR × wi) + (CC × wc) + (DDT × wd)

Priority Index · weighted sum of four scoring axes · weights vary by adversary profile

02 - SCORING AXES

Four axes. One decision.

Each candidate control is scored on a 1–5 ordinal scale across four axes. The first two capture what matters against any adversary - disruption of their plan and limitation of their damage. The second two capture implementation reality: cost and detection timing.

Axis A · Disruption

Actor Disruption Value

How strongly does this control interfere with the actor's campaign strategy?

5
Breaks or invalidates the strategy entirely
4
Forces significant tradecraft change
3
Causes meaningful friction
2
Minor inconvenience
1
Negligible effect on operations
Axis B · Impact

Impact Risk Reduction

If the actor succeeds elsewhere, how much damage does this prevent?

5
Prevents catastrophic or irreversible impact
4
Strongly limits blast radius
3
Partial damage reduction
2
Minimal reduction
1
Cosmetic only
Axis C · Feasibility

Cost & Complexity

How realistic is implementation under current resource constraints?

5
Low cost, low friction
4
Moderate effort
3
Manageable complexity
2
High effort
1
Very expensive or disruptive
Axis D · Timing

Detection-to-Decision Time

Does this provide usable signal early enough to change outcomes?

5
Immediate or pre-impact
4
Early warning
3
Delayed but still actionable
2
Mostly reactive
1
Post-incident forensic value only
03 - INTERACTIVE

Score it yourself.

Load a predefined actor profile and control set, or build your own. Click any score to change it. The Priority Index updates live, and the tier distribution shows you which controls deserve attention first against this specific adversary.

ACDP Scoring Engine · Live
Actor Profile
Destructive State-Aligned Actor
Prioritizes strategic impact over access longevity. Examples include Sandworm-style operations against critical infrastructure.
ADV
35%
IRR
35%
CC
15%
DDT
15%

Candidate Controls

Control
ADV
IRR
CC
DDT
PI

Priority Distribution

Tier 1 · Immediate
PI ≥ 4.00
Tier 2 · Planned
PI 3.00 – 3.99
Tier 3 · Deferred
PI 2.00 – 2.99
Tier 4 · Deprioritized
PI < 2.00
Interpretation

04 - WORKED EXAMPLES

Three actors. Three orderings.

The same six defensive controls, scored against three different adversary profiles, produce three different prioritizations. This is the core claim of ACDP: what matters most is not the controls themselves but who you are defending against. Click a profile to load it into the calculator.

Profile 01 · State-Aligned

Sandworm

Destructive · Impact-Maximizing

Prioritizes strategic damage over persistence. Recovery capability outranks detection; infrastructure hygiene outranks user behavior. Controls that feel boring dominate the ranking.

Top priority: Immutable offline backups
Load in calculator
Profile 02 · State-Sponsored

Gamaredon

Espionage · Stealth-Maximizing

Prioritizes long-term access and data collection over disruption. Early detection matters more than recovery; infrastructure tracking outranks endpoint response; user awareness rises in value.

Top priority: Historical DNS & infrastructure analysis
Load in calculator
Profile 03 · Financially Motivated

Stealer Operation

Crimeware · Access-Persistent

Prioritizes credential harvesting and persistent access. Detection timing and cost-effectiveness dominate; awareness training regains value; backup strategies matter less than for destructive profiles.

Top priority: PowerShell logging & EDR
Load in calculator