Hunt for the gaps in your defences.
Threat simulation is a highly bespoke activity, during which we take on the role of an agreed threat actor or threat group to find the gaps in blue team tradecraft (the operations performed by security, incident response, and monitoring teams) or defensive capabilities that attackers would exploit. Starting from use-case modelling, through to targeted validation of the protective monitoring solution, and finally on to full threat simulation and red team engagement.
Working at varying levels of covertness, the aim of the engagement is to identify gaps in the defenders’ visibility and in their ability to stop an attack that is in motion, whilst using the same tactics, techniques, and procedures (TTPs) that known threat groups use.
Depending on the threat model for the target organisation and the level of prior knowledge, simulated attackers’ capabilities and their underlying motivation can be tailored to suit the specifics of that threat model, in order to provide an effective simulation of a real-world attack.