🌙
 

Subscribe to the Taegis™ XDR Documentation RSS Feed at .

Learn more about RSS readers or RSS browser extensions.

Adversary Emulation Exercise

Service Overview

The Adversary Emulation Exercise uses threat intelligence to challenge your organization's capabilities to detect, prevent, and respond to a defined threat actor that is known to target your organization's industry. Through emulating the tactics, techniques, and procedures ("TTPs") of the specific threat actor, the objectives of the exercise are as follows:

Secureworks offers two tiers for the Adversary Emulation Exercise which allow organizations to focus on either a full spectrum of emulated threats through each phase of a cyber-attack or purely on the internal network from a post-breach context as described in the following table.

Adversary Emulation Exercise - Lite For organizations who are less concerned with their perimeter and social engineering defenses and who primarily would like to test assumptions about detection, prevention, and response capabilities for activity within the internal network, the "Adversary Emulation Exercise - Lite" takes place over two weeks from an assumed breach context, such as starting from a compromised endpoint or compromised credentials through a VPN or virtual desktop environment. The Lite option is also an attractive option for organizations who are looking for a shorter exercise duration.
Adversary Emulation Exercise - Standard The Standard tier of the Adversary Emulation Exercise examines the detection, prevention, and response capabilities of your organization covering all phases of an attack starting from an assessment of perimeter assets and external footprint, social engineering campaigns for initial access, and ultimately moving to the internal network where consultants will aim to act on goals and objectives established during a pre-engagement kickoff meeting.

Three main features differentiate the Adversary Emulation Exercise from a standard penetration test:

Service Methodology

The Adversary Emulation Exercise is conducted following each tactical phase of the MITRE ATT&CK framework and is in alignment with methodologies such as TIBER, CBEST, and iCAST, using a combination of proprietary, commercial, and open-source tools and data to ensure a complete assessment of detection, prevention, and response capabilities. A high-level overview of the methodology is summarized below:

Outcome

Upon completion of active exercise operations, Secureworks performs a thorough review and analysis of data and logs that were collected during the exercise.

Secureworks maintains comprehensive documentation of how the goals and objectives were achieved. The documentation is used to develop a report containing details about penetration, techniques and tools used, vulnerabilities and systems exploited, the path the tester took through the environment, and how well your organization was able to detect, prevent, and respond to threats. Activities performed during the exercise are tied back to the MITRE ATT&CK framework to better illustrate and deepen knowledge of threat models. The report contains a complete narrative with supporting documentation, such as screenshots, code snippets, and other forms of evidence.

Scoping Information

Description Exercise Duration
Adversary Emulation Exercise - Standard 4 weeks
Adversary Emulation Exercise - Lite 2 weeks
Add-on: Extra Time* Starting from 1 week

*Additional time can be added to the exercise if desired; however, please note that extra time will be a requirement if the goals and objectives of the exercise warrant additional time as determined during a scoping call.

The complete Service Description for this service can be found here: Adversary Emulation Exercise

 

On this page: