Deployment of enterprise-scale deception should achieve the following cybersecurity requirements and goals:
- Generate actionable, high-fidelity alerts.
- Reduce the “dwell time” of an initial compromise.
- Confuse the attacker with false assets and misinformation.
- Tackle the human attacker or APT.
- Threat intelligence regarding tactics, techniques, and procedures.
- Integrate with existing defense-in-depth architecture.