While network infiltration is easy to miss, the actions performed by hackers post-penetration offer defenders an opportunity to discover an attack. Adversaries must perform a series of actions to successfully carry out their operation, providing defenders with several chances to proactively detect the attack.