to explore higher impact goals. Characteristics of the Assumed Breach Model:
Begins after a threat has breached an organization
Red Team focuses on the Stay In and Act phases
More efficient use of limited resources (time, money, and staff)
Requires providing access to the Red Team. This is commonly
done by launching a RedTeam’s malware, providing access to a specific asset, or providing passwords
Operational impacts and
goals must still be achievedShare with your friends: