Red teaming is a full scope, multi-layered, simulated attack designed to get a holistic review of the level of risk and vulnerabilities across people, processes and technologies in an organization. The ethical hacker will identify and test your exposures for weaknesses using social engineering and stealth to avoid detection. Red teaming is most useful when an organization has a robust security program in place and is looking beyond a traditional penetration test.
To get the most value, we recommend defining at least five goals or tasks for the testers to focus on. A few examples include obtaining domain admin privilege on the client's network, unauthorized access to payroll data, attempting to compromise a critical network component (e.g., firewall, switch, Crane, chemical pump), deploying ransomware (on test data), or access to credit cards or sensitive PHI information.
Red Teaming Approaches:
1. A timed approach where our team tries to get access to a specific objective or goal from the outside.
2. A split approach where our team sets a specific number of days to attempt to penetrate the network from the outside, followed by another specific number of days in an assumed breach scenario to see what damage can be done if someone obtains access.