Kill-Chain Mapping
A practical guide to kill-chain mapping for AI Trust & Safety practitioners.
What This Lesson Covers
Kill-Chain Mapping is a key lesson within Adversary Modeling. In this lesson you will learn the underlying T&S operations discipline, the practical artefacts and rituals that operationalise it inside a working team, how to apply the pattern to a live platform, and the failure modes that undermine it in practice.
This lesson belongs to the Threat & Risk Frameworks category. The category covers the structured thinking that turns ‘bad things might happen’ into a prioritised, defensible plan — harm taxonomy, threat modeling, abuse-vector mapping, risk prioritisation, adversary modeling, and emerging-threat identification.
Why It Matters
Model adversaries the way T&S work needs. Learn the adversary taxonomy (state-backed, organised criminal, lone-actor, opportunist, ideological, automated), capability profiles, motivation profiles, the kill-chain mapping (recon, gain-foothold, escalate, monetise/spread, persist), and the link from adversary model to detection investments.
The reason this lesson deserves dedicated attention is that AI Trust & Safety Operations is now operationally load-bearing: the EU DSA imposes direct duties with material fines, the UK Online Safety Act adds duty-of-care, NetzDG and India IT Rules add jurisdiction-specific requirements, customers and advertisers demand transparency, civil society and oversight boards inspect decisions, journalists publish individual cases, and AI agents are starting to abuse platforms at scale. Practitioners who reason from first principles will navigate the next obligation, the next incident, and the next stakeholder concern far more effectively than those working from a stale checklist.
How It Works in Practice
Below is a practical T&S operations pattern for kill-chain mapping. Read through it once, then think about how you would apply it inside your own team.
# T&S operations pattern
TS_STEPS = [
'Anchor the work in a specific threat model and the harm it addresses',
'Pick the right operational layer (signal, detection, investigation, action, runbook)',
'Integrate with the engineering / ops / governance lifecycle',
'Evaluate with a credible eval battery and an analyst-feedback loop',
'Deploy with SLAs, on-call, dashboards, and regulator-readable evidence',
'Run incidents and post-mortems that update the threat model and runbooks',
'Disclose appropriately to internal leadership, regulators, and the public',
]
Step-by-Step Operating Approach
- Anchor in a threat model — Which threat does this work address, and how does the threat ladder to harm? Skip this step and you build activity without direction.
- Pick the right operational layer — Signal, detection, investigation, action, or runbook. The wrong layer wastes capacity; the right layer compounds.
- Integrate with the lifecycle — T&S work has to land in design review, CI/CD for detections, on-call, and governance. Artefacts that are not integrated are the single biggest source of T&S theatre.
- Evaluate credibly — Eval batteries, analyst-feedback loops, and red-team probes. One signal is easy to Goodhart; a basket is harder to fake.
- Deploy with operational scaffolding — SLAs, on-call rotations, dashboards, runbooks, escalation paths, evidence handling. Deployment is half of T&S operations.
- Close the loop through incidents and PIR — Every incident produces action items that update the threat model, the detections, the runbooks, the SLAs, and the metrics. The function compounds year over year because of this loop.
- Disclose appropriately — Internal leadership for accountability, regulators for compliance, the public for transparency. Each audience has its own evidentiary standard.
When This Topic Applies (and When It Does Not)
Kill-Chain Mapping applies when:
- You are designing, shipping, or operating a platform with a T&S surface (consumer platform, marketplace, AI lab, enterprise SaaS with abuse risk)
- You are standing up or operating a T&S Operations function
- You are integrating AI / generative AI into a regulated platform (EU DSA, UK Online Safety Act, NetzDG, India IT Rules)
- You are responding to a regulator, oversight board, journalist, or board question about T&S operations
- You are running a T&S program review, third-party audit, or transparency report
- You are defining or honouring T&S commitments in a policy, RSP, or system card
It does not apply (or applies lightly) when:
- The work is pure research with no path to a deployed platform
- The system genuinely has no abuse surface and no decisions about people
- The activity is one-shot procurement of a closed-context tool with no public surface
Practitioner Checklist
- Is the threat this lesson addresses on the threat-model artefact, with a named owner and a residual-risk rating?
- Is the operational requirement written in SMART form, allocated to a layer (signal / detection / investigation / action / runbook), and traced to evidence?
- Is the work integrated into design review, CI/CD, on-call, and program reviews?
- Is the evaluation battery documented, reproducible, and run on a defined cadence?
- Are operational controls (SLAs, dashboards, alerts, runbooks, on-call, escalation paths) credible and drilled?
- Are incidents closed with action items that update the threat model, detections, runbooks, and metrics?
- Does the quarterly T&S report show the function is both healthy and effective on the worst-served slice?
Disclaimer
This educational content is provided for general informational purposes only. It does not constitute legal, regulatory, trust-and-safety, or professional advice; it does not create a professional engagement; and it should not be relied on for any specific operational decision. T&S norms, regulations, and best practices vary by jurisdiction, sector, and platform and change rapidly. Consult qualified platform / media counsel, T&S practitioners, and risk professionals for advice on your specific situation.
Next Steps
The other lessons in Adversary Modeling build directly on this one. Once you are comfortable with kill-chain mapping, the natural next step is to combine it with the patterns in the surrounding lessons — that is where doctrinal mastery turns into a working T&S Operations capability. T&S Operations is most useful as an integrated discipline covering threat modeling, detection, investigation, action, runbooks, metrics, crisis response, and industry collaboration.
Lilly Tech Systems