On Better Red Teaming
This post was inspired by Florian Roth's / (cyb3rops)'s / (Neo23x0)'s post, "The Problems with Today's Red Teaming". I have put a lot of thought into those issues and want to offer methods for people to improve their red teaming. This type of adversarial testing has many names, but for the sake of this post and simplicity we are just going to sum it all up as "purple teaming". I've used these methods to both write new alerts and hone blue team skills; I do this regularly in my practice, and have seen these methods improve defenses time over time. I just put out a piece looking at doing indepth threat emulation, I put out a workshop on purple teaming this year, and I'm planning on an upcoming and cooperative, macOS purple teaming series. I really believe in these methods, in terms of honing a blue team's effectiveness, writing better alerts through greater attack understanding, and working together as one team, with one objective. Let's look at some of Florian's issues with purple teaming from his article. His major points are bulleted bellow, followed by some of my advice on each:
My biggest piece of advice is don't make this adversarial. Use the red team as a type of threat intelligence or technique research group, and get them to do the work you want in exploring specific techniques. Get them to help you write the rules and alerts you want. Refocus them on areas your interested in getting a better understanding in or want to hone your detections. That said, it's probably a good idea to listen to them if they keep bringing a specific threat or technique to your attention. By hindering the red team you are just hindering your own ability to train and go deeper on different techniques. Finally, as Daniel Miessler says, a purple team is often a solution to a communications breakdown. If a red team and a blue team are already working together well, there is almost no need to introduce a purple team.
- Single Point of Failure or a Singular Kill Chain
- Aka too much depth and not enough breadth
- Focus is on the Kill Chain
- Aka not enough context in the execution
- Incomplete Simulations
- Aka red teams don't actually emulate threat actors
My biggest piece of advice is don't make this adversarial. Use the red team as a type of threat intelligence or technique research group, and get them to do the work you want in exploring specific techniques. Get them to help you write the rules and alerts you want. Refocus them on areas your interested in getting a better understanding in or want to hone your detections. That said, it's probably a good idea to listen to them if they keep bringing a specific threat or technique to your attention. By hindering the red team you are just hindering your own ability to train and go deeper on different techniques. Finally, as Daniel Miessler says, a purple team is often a solution to a communications breakdown. If a red team and a blue team are already working together well, there is almost no need to introduce a purple team.