Actor-Centric Defensive Prioritization (ACDP)

by Robin Dost

Introduction

Much of my previous work has focused on understanding threat actors not through individual malware samples alone, but through infrastructure, operational behavior, and strategic intent. Over time, a recurring problem became increasingly difficult to ignore:

While our visibility into attacker tradecraft continues to improve, our ability to decide what to defend first often does not.

Most security frameworks excel at describing what exists, techniques, controls, and best practices, but remain largely silent on what should matter most when resources are limited or when a specific threat actor becomes relevant.
Instead of introducing another generic framework, this article applies an actor-centric prioritization methodology focused on attacker intent and impact.
This approach emerged from a practical need I repeatedly encountered: organizations often had technically sound controls in place, yet still failed to prevent strategic loss, because their defensive investments were misaligned with the attackers actual objectives.

Why ACDP Was Developed

Actor-Centric Defensive Prioritization (ACDP) was developed to address a persistent gap between threat intelligence and defensive decision-making.

Threat intelligence typically answers questions such as:

  • Who is active?
  • What techniques are being used?

Defensive planning, however, must answer differnt questions:

  • What failure would be unacceptable?
  • Which controls meaningfully disrupt this actors strategy?

In real world environments, especially those facing state-aligned or destructive actors, it is rarely feasible to implement every recommended control simultaneously.
Prioritization becomes inevitable.

ACDP exists to make that prioritization explicit, defensible, and actor-aware.

What Makes This Approach Different

ACDP does not attempt to replace established frameworks such as MITRE ATT&CK or NIST.
Instead, it operates one level above them, using their outputs as inputs.

Its defining characteristic is a deliberate shift in perspective:

  • from technique coverage to strategic disruption
  • from static maturity models to adaptive decision-making
  • from generic best practices to context-driven trade-offs

The result is a reasoned ordering of defensive actions, based on how much they interfere with an adversary intent and how much damage they prevent if that interference fails.

Advantages of an Actor-Centric Approach

The strengths of ACDP are primarily practical:

  • ACDP enables rapid reprioritization when threat actor relevance changes
  • It aligns defensive investment with attacker objectives instead of abstract risk scores
  • It acknowledges budget and operational constraints instead of assuming ideal conditions
  • It helps explain why certain controls take priority, a critical factor in both technical and executive discussions

Most importantly: ACDP encourages organizations to think in terms of losing conditions, not only detection coverage

Limitations and Trade-Offs

ACDP is not without drawbacks.

Because it is actor-centric, its effectiveness depends on the quality of the underlying threat intelligence.
Incorrect assumptions about attacker intent can lead to misplaced priorities.
Additionally, ACDP does not provide prescriptive control definitions or implementation guidance. It assumes foundational security hygiene already exists and focuses solely on ordering, not designing, defensive measures.
Finally, ACDP deliberately avoids the comfort of exhaustive coverage. It forces uncomfortable decisions, choosing what not to prioritize, which may challenge existing security narratives.

A Practical Motivation

The motivation behind ACDP is operational necessity

In environments where time, budget, and certainty are constrained, security decisions must be made before all information is available. ACDP provides a structured way to make those decisions without pretending that all risks are equal.

If defensive priorities do not change when attacker intent changes, prioritization is no longer strategic

ACDP in Practice: Quantified Prioritization Example

This section demonstrates how ACDP produces concrete priorities, using a scoring example against Sandworm.

Step 0: Define the Objective Profile

Based on historical and current operations, Sandworm is modeled as a:

Destructive, state-aligned actor prioritizing strategic impact over access longevity

This assumption directly influences weighting.

Step 1: Define the Scoring Axes

Each defensive control is evaluated across four axes.

Axis A: Actor Disruption Value (ADV)

How strongly does this control interfere with the actors campaign strategy?

ScoreMeaning
5Breaks or invalidates the strategy
4Forces significant tradecraft change
3Causes friction
2Minor inconvenience
1Negligible effect

Axis B: Impact Risk Reduction (IRR)

How much real damage does this control prevent if the actor succeeds elsewhere?

ScoreMeaning
5Prevents catastrophic / irreversible impact
4Strongly limits blast radius
3Partial damage reduction
2Minimal reduction
1Cosmetic

Axis C: Cost & Operational Complexity (CC)

How realistic is implementation under time and budget pressure?

ScoreMeaning
5Low cost, low friction
4Moderate effort
3Manageable complexity
2High effort
1Very expensive / disruptive

Axis D: Detection-to-Decision Time (DDT)

Does this control provide usable signal early enough to change outcomes?

ScoreMeaning
5Immediate / pre-impact
4Early warning
3Delayed but actionable
2Mostly reactive
1Post-incident only

Step 2: Actor-Specific Weighting

For a destructive actor, impact prevention and strategic disruption dominate:

  • ADV = 35%
  • IRR = 35%
  • CC = 15%
  • DDT = 15%

Step 3: Scoring Selected Controls

Candidate Controls

  • Immutable offline backups
  • VPN / edge device inventory & patch SLAs
  • Historical DNS & infrastructure analysis
  • PowerShell command-line logging
  • Scheduled task auditing
  • Security awareness training

Scoring Table

ControlADVIRRCCDDT
Immutable offline backups5535
Edge inventory & patching4444
Historical DNS analysis4344
PowerShell logging3243
Scheduled task auditing3233
Awareness training1151

Step 4: Priority Index Calculation

Formula

PI = (ADV × 0.35) + (IRR × 0.35) + (CC × 0.15) + (DDT × 0.15)

Example Calculations

Immutable offline backups

(5×0.35) + (5×0.35) + (3×0.15) + (5×0.15) = 4.70

PowerShell logging

(3×0.35) + (2×0.35) + (4×0.15) + (3×0.15) = 2.80

Step 5: Final Prioritization

ControlPIPriority Tier
Immutable offline backups4.70Tier 1
Edge inventory & patching4.00Tier 1
Historical DNS analysis3.75Tier 2
PowerShell logging2.80Tier 2
Scheduled task auditing2.75Tier 3
Awareness training1.90Tier 4

Step 6: Interpretation

The results highlight several non-obvious truths:

  • Recovery capability outranks detection
  • Infrastructure hygiene outranks user behavior
  • Controls that look impressive may rank low
  • Controls that feel boring often dominate

This is basically the mathematical expression of attacker intent.

Why the Calculation Matters

Without explicit scoring:

  • prioritization becomes opinion
  • decisions become political
  • trade offs remain implicit

ACDP forces those trade-offs into the open.

If you cannot explain your priorities numerically, you are not prioritizing: you are rationalizing

Closing Thoughts

Often times security failures are caused not by missing controls, but by misaligned priorities.
ACDP was developed to address this misalignment by shifting the focus from technique coverage to attacker intent, and from abstract risk to tangible impact. Its value lies in deliberate selection.
Used correctly, ACDP does not replace existing frameworks, but sharpens them by forcing uncomfortable but necessary decisions.
This methodology is intentionally opinionated!


If you have any feedback or questions, please feel free to contact me by email.
I welcome criticism and feedback!

Upload Response

Your data will be stored in the mainframe. Required fields are marked *