The term “Cyber Kill Chain” has been widely used by the security community to describe the different stages of cyber attacks. When combined with advanced analytics and predictive modeling, however, the cyber kill chain becomes critical for inside out security. Author of presentation using methodology based on cyber kill chain implement security policy to increase level of cyber security in network. Mapping security controls and procedures to each stage of the kill chain, WASK security team developed very detailed, result-oriented security procedures. Presentaton provides information how to understand kill chain model, how implement security policy to could respond on incident and how should look incident response procedures. All of that is important to build cybersecurity in data center.