Scanning your connection...
Back to Glossary
OpSec

What is Operational Security (OPSEC)?

The process of identifying, controlling, and protecting information that could give an adversary insight into your activities, intentions, or capabilities.

OPSEC originated in military intelligence but applies to anyone who needs to protect sensitive information.

The Five Steps

  1. Identify critical information: What do you need to protect?
  2. Analyze threats: Who might want this information?
  3. Analyze vulnerabilities: How could they get it?
  4. Assess risk: How likely is each vulnerability to be exploited?
  5. Apply countermeasures: What can you do to reduce risk?

Digital OPSEC Checklist

  • Use unique passwords for every account
  • Enable strong 2FA everywhere
  • Compartmentalize identities (separate email, browser, devices)
  • Review what you share publicly (social media, forums)
  • Use encrypted communications for sensitive discussions
  • Regularly audit your digital footprint

The Weakest Link

OPSEC is only as strong as the weakest link in the chain. Technical security is worthless if you discuss sensitive information in person near someone's phone, or post about it on social media under your real name.

Related Terms

Have more questions?

Use our guided flow to get the right next privacy step for Operational Security (OPSEC).

Open Guided Flow