🌙
 

Subscribe to the Taegis™ XDR Documentation RSS Feed at .

Learn more about RSS readers or RSS browser extensions.

Adversary Simulation Exercise

Adversary Simulation Exercise

Service Overview

The Adversary Simulation Exercise challenges your organization's capabilities to detect, prevent, and respond to an unknown, sophisticated threat actor with specific goals and objectives that are tailored to your environment and a realistic threat model. The Secureworks Red Team adopts customized tooling and techniques as needed to assume the role of a unique threat actor. Through simulating a realistic attack by a unique adversary with non-attributable tactics, techniques, and procedures, the objectives of the exercise are as follows:

While the Adversary Simulation Exercise is largely geared towards organizations with a moderate amount of security maturity, Secureworks offers two tiers and customization options for the exercise to better help train defenders regardless of your current level of security maturity. This allows for scalable sophistication as well as an option to focus only on the internal network from a post-breach context for organizations who are more interested in examining detection, prevention, and response capabilities from this standpoint only. The following table describes the differences between the two tiers.

Adversary Simulation Exercise - Lite For organizations who are less concerned with their perimeter and social engineering defenses and who primarily would like to test assumptions about detection, prevention, and response capabilities for activity within the internal network, the "Adversary Simulation Exercise – Lite" takes place over two weeks from an assumed breach context, such as starting from a compromised endpoint or compromised credentials through a VPN or virtual desktop environment. The Lite option is also an attractive option for organizations who are looking for a shorter exercise duration.
Adversary Simulation Exercise - Standard The Standard tier of the Adversary Simulation Exercise examines the detection, prevention, and response capabilities of your organization covering all phases of an attack starting from an assessment of perimeter assets and external footprint, social engineering campaigns for initial access, and ultimately moving to the internal network where consultants will aim to act on goals and objectives established during a pre-engagement kickoff meeting.
While the Adversary Simulation Exercise strives to test defenders against a highly sophisticated threat actor, the exercise can be customized to reduce sophistication and adopt more common tactics, techniques, and procedures (TTPs) based on your organization's comfort and security goals.

Three main features differentiate the Adversary Simulation Exercise from a standard penetration test:

Service Methodology

The Adversary Simulation Exercise is conducted following each tactical phase of the MITRE ATT&CK framework using a combination of proprietary, commercial, and open-source tools to ensure a complete assessment of detection, prevention, and response capabilities. A high-level overview of the exercise methodology is summarized below:

As the exercise is constrained by time limitations unlike true adversaries, if Secureworks is unable to find a way to breach the perimeter through exploitation or social engineering in a pre-determined timeframe, an assumed breach model will be adopted to progress the exercise to the internal access phase. The assumed breach scenario can be decided during the kickoff meeting scheduled well in advance of start of the engagement, and there are several potential options such as endpoint compromise with command-and-control malware or credential compromise with VPN access.

The exercise assesses whether current security controls and personnel can mitigate and evict adversaries before they are able to follow-through on their goals and objectives. If Secureworks consultants are successfully evicted from the environment, as opposed to using the remaining time attempting to re-gain access, it is encouraged to proceed into a phase that only monitors subsequent activities to gain a full picture of the latter portions of the kill chain, and to identify potential security gaps.

Outcome

Upon completion of active exercise operations, Secureworks performs a thorough review and analysis of data and logs that were collected during the engagement.

Secureworks maintains comprehensive documentation of how the goals and objectives were achieved. The documentation is used to develop a report containing details of the penetration, the techniques and tools used, the vulnerabilities and systems exploited, the path the tester took through the environment, and how well your organization was able to detect, prevent, and respond to threats. Activities performed during the exercise are tied back to the MITRE ATT&CK® framework to better illustrate and deepen knowledge of threat models. The report contains a complete narrative with supporting documentation, such as screenshots, code snippets, and other forms of evidence.

Scoping Information

Description Exercise Duration
Adversary Simulation Exercise - Standard 4 weeks
Adversary Simulation Exercise - Lite 2 weeks
Add-on: Extended Time* Starting from 1 week
Add-on: Physical security attacks component - One (1) location ** -
Add-on: Wireless - One (1) location -

*Additional time can be added to the exercise if desired; however, please note that extra time will be a requirement if the goals and objectives of the exercise warrant additional time as determined during a scoping call.

** Due to the unique nature of physical social engineering, additional scoping will be required. This includes a scoping teleconference with a member of the Secureworks physical security testing team, and additional legal protections for both you and Secureworks.

The complete Service Description for this service can be found here: Adversary Simulation Exercise

Scheduling and Booking Information

See Service Scheduling for information about scheduling this service.

 

On this page: