A red team exists to attack, a blue to defend. The ambition is to strengthen an organisation's security by learning from the ensuing combat. A purple team is optionally set up to support the process.
A red and blue team exercise can be hugely beneficial as it affords the opportunity to challenge your organisation's defences realistically.
A red team is typically independent of the company (target) and hired to covertly test its defences. The team consists of skilled ethical hackers whose objective is to identify and safely exploit vulnerabilities in the target's cybersecurity or physical perimeters.
By mimicking sophisticated real-world threats, the exercise is highly realistic. A red team deploys bleeding edge hacking tools and techniques designed to infiltrate systems and premises. This could extend to writing their own malware and devising new methodologies, just as malicious hackers do.
Traditional penetration testing deploys loud (typically detectable) techniques - e.g. vulnerability scanners such as Nessus - to identify gaps in security. In contrast, a red team is stealthy and will do everything it can to avoid detection.
Some organisations will be confident their systems are hard to penetrate as they have a variety of robust security measures in place. But a red team need only find the weakest link to break their perimeters wide open. This could include spear-phishing (socially engineering) employees or replicating the target's external services in a lab to find zero-day exploits.
In a red team engagement, anything goes. If this means arriving at the company's offices disguised as a delivery driver asking to "quickly pop into the post room" so be it. As they pass through, they'll discreetly insert a USB drive into a PC. Mission accomplished.
The red team’s objectives and duties include:
The red team's methods include:
A blue team is a company's own cybersecurity personnel, typically within a Security Operations Centre (SOC). The SOC consists of highly trained analysts who work on defending and improving their organisation's defences around the clock.
The blue team is expected to detect, oppose and weaken the red team. The mock attack scenario is designed to enhance their skills by preparing them for dangerous real-world attacks.
Many of today's threats, such as malware and phishing emails, will be stopped dead by automated tools on the network's perimeter. For example, endpoint security products and threat detection platforms. The SOC or blue team adds vital human intelligence to the tools and technologies and is both proactive and reactive.
The blue team will detect and neutralise the more sophisticated attacks and closely monitor current and emerging threats to preemptively defend the organisation.
The blue team's objectives and duties include:
The blue team's methods include:
A purple team is not permanent; it has a transient function to oversee and optimise the red and blue team exercise. It's typically formed of security analysts or senior security personnel within the organisation.
If the red and blue teams work well, a purple team may become redundant. It can be more of a concept than a function, driving the red team to test and target specific elements of the blue team's defence and detection capabilities.
The purple team's objectives and duties include: