Creating a Threat Profile by Decomposing a ThreatThreat profiles can be built by decomposing existing threats into core components then recomposing them into profiles a Red Team can use to describe and execute a Red Team engagement.
The Management ChallengeWhen a Red Team is asked to perform threat
emulation of a specific actor, the limits of budget, time, and effort can easily be pushed to the edge.
Strong Red Team leadership is required to bridge the gap of realism and effectiveness when emulating a threat.
Breaking down a threat into its components and choosing those items that best exercise the engagement’s goals provides leadership a roadmap of how the threat will be accurately represented. In this way, a threat can
be emulated within a budget, time, and resource-constrained environment.
Creating a threat profile is a great way of establishing the rules as to how a Red Team will act and operate. These act as a roadmap fora Red Team by providing guidance on how and what type of actions should be performed. They help all sides (Red and Blue) ensure the Red Team is emulating the correct threat. Remember, a Red Team engagement is not an all-out hack fest.
In many cases, a Red
Team is helping personnel understand how a specific threat impacts an organization. Even during an in-depth,
full-scale Red Team engagement, a threat profile should be created. It helps describe the threat and their TTPs. This material is ideal for setting the scenario, threading a threat’s story, and can immensely improve the final report.
Share with your friends: