
Cyber Battle MapsTM
Build it right. Defend it always.
Where cyber practitioners battle threat actors through defensible architecture and engineering decisions.
Join architects and engineers worldwide shaping the future of cybersecurity through technical concepts, models, and our Defensible 10 Standards.
The Cyber Capstone Threat Models
Cyber Battle Maps are ISAUnited’s threat-mapping deliverables used in the Cyber Capstones. They are created through structured threat modeling, then expressed as an architecture-level threat model view that can be reviewed consistently.
Each Cyber Battle Map begins with the scenario provided architecture diagram and is developed into a submitted map that communicates likely compromise routes, key decision points, and the defensive design direction.
A Cyber Battle Map is produced using ISAUnited’s Blue Team and Red Team learning ecosystem:
-
Intrusion Vault: Threat Actors, Threat Vectors, and Threat Tools that frame adversary behavior and how compromise progresses.
-
Defense Toolbox: Defensible 10 Standards and the Defensible Engineering Catalog, used to guide defensive mechanism selection and placement.
Cyber Battle Maps are evaluated as simulation artifacts. They are designed to assess clarity of thinking, architectural-level reasoning, and the ability to communicate defensible design intent under pressure from adversaries.
Three Card System
Our Cyber Capstones use Threat Vector Catalog cards to describe compromise paths, Threat Actor cards to anchor realistic behavior, and Defensible Engineering Catalog cards to guide the selection and placement of defensive mechanisms. This creates a repeatable language for training, evaluation, and executive reporting.

The Map Is the Battlefield
Architecture diagrams drive every decision.
Cyber Battle Maps treats architectural design as the primary instrument of cyber defense. Practitioners diagram the environment, mark trust boundaries and critical flows, overlay threat vectors, and produce a defensible build plan that identifies what must be protected and how it will be protected.

Get Started
For the School of Engineering Cyber Defense
Enroll in your program pathway and complete your capstone inside the Cyber War Center when you reach the submission stage.
Enroll as a Student | Learn About Capstones.
For Organizations
Contact us below to choose a simulation track and set your annual readiness and evaluation plan.
Activate your tech teams' ISAUnited membership | Member organizations receive discounted rates.




