The moment you walk into a crisis meeting, the PowerPoint deck is already open, and the senior vice‑president of “Something Important” is asking, “Are we breached or not?” You could respond with a screenshot of the MITRE ATT@CK matrix— all 2,000‑plus coloured squares that make analysts purr and executives panic. Or you could open with UNIDIR’s new ICT Intrusion Path, a simple map that borrows more from airport signage than threat‑intelligence spreadsheets. The model doesn’t start by listing every exotic exploit or parsing the exact second a malicious DLL is sideloaded. Instead, it asks the oldest, most intuitive security question in the world:
Where is the adversary standing right now—outside our walls, pushing on the gates, or wandering our hallways?
The location-first view accomplishes two immediate objectives. Firstly, it establishes a clear and comprehensible framework for the discussion, defining the concepts of “outside,” “on,” and “inside.” Secondly, it facilitates the seamless integration of new technologies, such as cloud computing, zero-trust architectures, and emerging technologies like artificial intelligence, without necessitating a rewrite of the fundamental metaphor. In essence, the ICT Intrusion Path provides a concise and visually appealing three-color map that effectively conveys the concepts to even the most skeptical executives, ensuring their comprehension before the completion of the second slide.

The Three Zones in Plain Language
Zone | What it looks like | Everyday examples |
---|---|---|
Outside the Perimeter | Everything on the open internet that touches your brand but not your network. | LinkedIn résumé mining, Shodan scans ( Shodan ), dark‑web exploit shopping. |
On the Perimeter | All the devices and services that say “Welcome, please authenticate.” | Firewalls, VPN portals, e‑mail gateways, SaaS login pages. |
Inside the Perimeter | Anything behind the badge swipe or MFA prompt. | Domain controllers, file shares, EDR agents, ERP servers. |
Chart 1 above shows a quick attacker‑versus‑defender AI scorecard.
Each zone has its own legal rules, budget owners, and reputational landmines— one more reason pinning the attacker’s location first is so disarmingly effective.
How Artificial Intelligence Warps Every Zone
AI doesn’t wait politely at the door—it amplifies whatever zone it touches. Outside the perimeter, large‑language models automate reconnaissance, scrape breach forums in seconds, and pump out polymorphic malware that mutates faster than signature scanners learn its name. On the perimeter, the same generative engines craft deep‑fake voicemail scams and translate fresh exploits into your exact cloud‑edge stack on demand, while defenders lean on behavioural authentication and anomaly scoring to swat away the most convincing impostors. Inside the perimeter, the future threat is autonomous agents that pivot laterally at machine speed, balanced—one hopes—by self‑healing networks that isolate and patch without a 3 a.m. bridge call. AI, in short, accelerates both offence and defence; the ICT Intrusion Path simply points to the lane in which the arms race is unfolding.

Why Executives Love (and Sometimes Loathe) the Path
The model’s appeal is evident: three distinct zones can be conveniently displayed on a single slide, enabling even non-technical directors to monitor the conversation from risk assessment to budgetary considerations. For each potential negative outcome, the accompanying briefs provide at least one countermeasure, transforming the process of doomscrolling into a strategic game akin to chess. The AI spotlight forces a concrete discussion about how generative tools change every defensive playbook, and UNIDIR’s helpful footnotes crosswalk each zone to the familiar ATT@CK tactics and Kill‑Chain stages , ensuring analysts never lose their bearings when the meeting ends and the real work begins.
Yet simplicity is a double‑edged sword. Those same three buckets are far too coarse‑grained to write an EDR rule or a SIGMA signature; kernel‑level implants, operational‑technology quirks, and container break‑outs all collapse into a single “inside” blob. Hybrid and multi‑cloud architectures blur the neat perimeter metaphor, and the authors admit the document will have to evolve as zero‑trust mesh and AI‑native networks spread. In other words, the ICT Intrusion Path is an elegant framing device, not a replacement for the deeper playbooks it points toward.

From Map to Motion—Putting the Path to Work
Treat UNIDIR’s diagram as the brightly coloured concourse map at an international airport. It orients every traveller—legal, PR, operations, board—within seconds, and it exposes the chokepoints where AI may tip the odds in or against your favour. Once everyone knows which terminal they occupy (outside, on, or inside), hand the pilots and ground crew their detailed charts: ATT@CK for pinpoint‑level telemetry, the Kill Chain for timeline storytelling, and any cloud‑specific frameworks your environment demands ( CISA Cloud SaaS Security Guidance ). The ICT Intrusion Path does not guarantee complete coverage of all gates, but it ensures that every stakeholder commences the journey on an identical footing—a valuable advantage when an alarm genuinely occurs at 2 a.m. Do you think UNIDIR’s methodology helps politicians and C-level managers? Do we still need a middle person to explain technology in layperson’s vocabulary? Which methodology do you prefer, UNIDIR, MITRE Att@ck, or Kill Chain?